News for package chrony

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.0
Source: chrony
Binary: chrony
Architecture: any
Version: 1.24-3.1+deb7u3
Maintainer: John G. Hasler <[email protected]>
Standards-Version: 3.8.3
Build-Depends: debhelper (>= 7), texinfo, libreadline-gplv2-dev, bison
Package-List: 
 chrony deb admin extra
Checksums-Sha1: 
 6e17d7b8cdd3508751713bd2279202b75643e268 364311 chrony_1.24.orig.tar.gz
 42503cd82039a0ef0b5cd718f179b6eb666708e1 267145 chrony_1.24-3.1+deb7u3.diff.gz
Checksums-Sha256: 
 dd0e6c98a7e094d760d83a1681f85d84f3a5103400c49b4a9e062bbe02ceb215 364311 chrony_1.24.orig.tar.gz
 1533e49b4606912343d69549b44587e4b3d85e50bc1f072bdd47226da0dd05af 267145 chrony_1.24-3.1+deb7u3.diff.gz
Files: 
 8849e95428f43c5ab2692a2812653e65 364311 chrony_1.24.orig.tar.gz
 64c36e07805ebf1df0e16815e730bc98 267145 chrony_1.24-3.1+deb7u3.diff.gz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCgAGBQJVKmLBAAoJEK+lG9bN5XPLwWoP/1PzCoPjgJu3jq75XHIPjNtK
iEvR89JB+Tvhra1mpF207s5SMjsCc4v9G0H2ZwtfG7YctqastdwR+V45gFnhj+D6
j9y7pzjZGLo998CaxFA8yHF3qGd4KDUyoQ3QpJcSEDsjLuH4CWQo+vmYA2ifFqLR
d1lEsZ6+FZu1tLyT020PvQaQ73Pat06vD9Ds2dCBTbE9uQRlEM4lxjCR41p1vpt4
7SLBAxT5i7FQPov7xW402d7E50eKOIZ1mzcZqFu8Nx/x2T1raFaEPn7/FSne9YSK
96PFUdC1YejI1cruqEK0JdvFN3CXfdqCexisqH7QC4qXu63Dn+JkL8B5B2q4FU0r
brhvLof2dbJuHLmCJu4FYJtILiel2PF3l3VgTNQVQ/lbqz2TSiPOQ1FWed+daLfm
mtCZMnL9Tf+kz5MsRCzSJQ5H43BZlqytNMhx/Z9FdPMnFdHSjDqxIZ/WSk9nZBE9
vwLGHSyF1MU0+c3sBVGnGcZmilpT71Ki5VmlgQoCbRu+V+ifuEIGFi1bLEHfxt+i
BHxpYo+EYD3lKzizCI8/sN4ZZ+VTJELsO6Enmz6LOz3h4IhdM/SNg82//gH1o8On
QCLHvC3Jh9C8fhGAA3zWbFbAcTvNgIk6nPJDjGajJNhLbPDcUkacpOc0XKIaoLRe
rvGyvymPopaGA2DWsltC
=Tcqu
-----END PGP SIGNATURE-----

Changes:
chrony (1.24-3.1+deb7u3) wheezy-security; urgency=medium

  * With the following security bugfixes (See: #782160):
    - Fix CVE-2015-1853: Protect authenticated symmetric NTP
                         associations against DoS attacks.
    - Fix CVE-2015-1821: Fix access configuration with subnet
                         size indivisible by 4.
    - Fix CVE-2015-1822: Fix initialization of reply slots for
                         authenticated commands.

 -- Joachim Wiedorn <[email protected]>  Fri, 10 Apr 2015 22:25:52 +0200