{"id":"MGASA-2015-0163","summary":"Updated chrony packages fix security vulnerabilities","details":"Updated chrony package fixes security vulnerabilities:\n\nUsing particular address/subnet pairs when configuring access control would\ncause an invalid memory write. This could allow attackers to cause a denial\nof service (crash) or execute arbitrary code (CVE-2015-1821).\n\nWhen allocating memory to save unacknowledged replies to authenticated\ncommand requests, a pointer would be left uninitialized, which could trigger\nan invalid memory write. This could allow attackers to cause a denial of\nservice (crash) or execute arbitrary code (CVE-2015-1822).\n\nWhen peering with other NTP hosts using authenticated symmetric association,\nthe internal state variables would be updated before the MAC of the NTP\nmessages was validated. This could allow a remote attacker to cause a denial\nof service by impeding synchronization between NTP peers (CVE-2015-1853).\n","modified":"2026-04-16T06:24:47.505136031Z","published":"2015-04-23T21:14:25Z","upstream":["CVE-2015-1821","CVE-2015-1822","CVE-2015-1853"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2015-0163.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=15647"},{"type":"WEB","url":"http://chrony.tuxfamily.org/News.html"},{"type":"WEB","url":"https://www.debian.org/security/2015/dsa-3222"}],"affected":[{"package":{"name":"chrony","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/chrony?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.29.1-1.1.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2015-0163.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}