[chrony-users] chrony-1.29.1 released (security) |
[ Thread Index | Date Index | More chrony.tuxfamily.org/chrony-users Archives ]
chrony-1.29.1 is now available. It fixes a security vulnerability in the chrony control protocol. The sources can be downloaded here: http://download.tuxfamily.org/chrony/chrony-1.29.1.tar.gz MD5 and SHA1 sums: 9d49eadac5eb49daec8cc3d92a869b0c chrony-1.29.1.tar.gz bf07c0afa6ab761d9863714497555fa5be578f3d chrony-1.29.1.tar.gz Security fixes -------------- * Modify chronyc protocol to prevent amplification attacks (CVE-2014-0021) (incompatible with previous protocol version, chronyc supports both) Upgrade to 1.29.1 is mainly recommended for users running chronyd with public control access (given by the cmdallow directive). If upgrade is not possible, another option is to configure firewall to rate limit incoming packets to the command port (UDP port 323 by default). CVE-2014-0021: Amplification in chrony control protocol In the chrony control protocol some replies are significantly larger than their requests, which allows an attacker to use it in an amplification attack. With hosts allowed by cmdallow (only localhost by default) the maximum amplification factor is 9.2. Hosts that are not allowed receive a small reply with error status, which allows amplification of up to 1.5. To fix the problem, the protocol has been modified to require padding in the request packet, so replies are never larger than their requests. Also, chronyd no longer sends replies with error status to hosts that are not allowed by cmdallow. -- Miroslav Lichvar
Attachment:
pgp6adjXEnZqj.pgp
Description: PGP signature
Mail converted by MHonArc 2.6.19+ | http://listengine.tuxfamily.org/ |