[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 742-1] chrony security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : chrony
Version        : 1.24-3.1+deb7u4
CVE ID         : CVE-2016-1567
Debian Bug     : 812923 568492

It was discovered that Chrony, a versatile implementation of the
Network Time Protocol, did not verify peer associations of symmetric
keys when authenticating packets, which might allow remote attackers
to conduct impersonation attacks via an arbitrary trusted key, aka a
"skeleton key."

This update also resolves Debian bug #568492.

For Debian 7 "Wheezy", these problems have been fixed in version
1.24-3.1+deb7u4.

We recommend that you upgrade your chrony packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=UXc+
-----END PGP SIGNATURE-----


Reply to: