CentOS Errata and Security Advisory CESA-2015:2241
The chrony suite, chronyd and chronyc, is an advanced implementation of the
Network Time Protocol (NTP), specially designed to support systems with
intermittent connections. It can synchronize the system clock with NTP
servers, hardware reference clocks, and manual input. It can also operate
as an NTPv4 (RFC 5905) server or peer to provide a time service to other
computers in the network.
An out-of-bounds write flaw was found in the way chrony stored certain
addresses when configuring NTP or cmdmon access. An attacker that has the
command key and is allowed to access cmdmon (only localhost is allowed by
default) could use this flaw to crash chronyd or, possibly, execute
arbitrary code with the privileges of the chronyd process. (CVE-2015-1821)
An uninitialized pointer use flaw was found when allocating memory to save
unacknowledged replies to authenticated command requests. An attacker that
has the command key and is allowed to access cmdmon (only localhost is
allowed by default) could use this flaw to crash chronyd or, possibly,
execute arbitrary code with the privileges of the chronyd process.
(CVE-2015-1822)
A denial of service flaw was found in the way chrony hosts that were
peering with each other authenticated themselves before updating their
internal state variables. An attacker could send packets to one peer host,
which could cascade to other peers, and stop the synchronization process
among the reached peers. (CVE-2015-1853)
These issues were discovered by Miroslav LichvΓ‘r of Red Hat.
The chrony packages have been upgraded to upstream version 2.1.1, which
provides a number of bug fixes and enhancements over the previous version.
Notable enhancements include:
Updated to NTP version 4 (RFC 5905)
Added pool directive to specify pool of NTP servers
Added leapsecmode directive to select how to correct clock for leap
second
Added smoothtime directive to smooth served time and enable leap smear
Added asynchronous name resolving with POSIX threads
Ready for year 2036 (next NTP era)
Improved clock control
Networking code reworked to open separate client sockets for each NTP
server
(BZ#1117882)
This update also fixes the following bug:
In addition, this update adds the following enhancement:
All chrony users are advised to upgrade to these updated packages, which
correct these issues and add these enhancements.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-cr-announce/2015-November/028417.html
Affected packages:
chrony
Upstream details at:
https://access.redhat.com/errata/RHSA-2015:2241
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 7 | x86_64 | chrony | <Β 2.1.1-1.el7.centos | chrony-2.1.1-1.el7.centos.x86_64.rpm |