f68c4ab872
Fixes CVE-2014-0021: Amplification in chrony control protocol In the chrony control protocol some replies are significantly larger than their requests, which allows an attacker to use it in an amplification attack. With hosts allowed by cmdallow (only localhost by default) the maximum amplification factor is 9.2. Hosts that are not allowed receive a small reply with error status, which allows amplification of up to 1.5. To fix the problem, the protocol has been modified to require padding in the request packet, so replies are never larger than their requests. Also, chronyd no longer sends replies with error status to hosts that are not allowed by cmdallow. Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
43 lines
1000 B
Makefile
43 lines
1000 B
Makefile
################################################################################
|
|
#
|
|
# chrony
|
|
#
|
|
################################################################################
|
|
|
|
CHRONY_VERSION = 1.29.1
|
|
CHRONY_SITE = http://download.tuxfamily.org/chrony/
|
|
CHRONY_LICENSE = GPLv2
|
|
CHRONY_LICENSE_FILES = COPYING
|
|
|
|
CHRONY_CONF_OPT = --host-system=Linux --host-machine=$(BR2_ARCH) --prefix=/usr
|
|
|
|
ifeq ($(BR2_PACKAGE_LIBNSS),y)
|
|
CHRONY_DEPENDENCIES += host-pkgconf libnss
|
|
else
|
|
CHRONY_CONF_OPT += --without-nss
|
|
endif
|
|
|
|
ifeq ($(BR2_PACKAGE_READLINE),y)
|
|
CHRONY_DEPENDENCIES += readline
|
|
else
|
|
CHRONY_CONF_OPT += --disable-readline
|
|
endif
|
|
|
|
ifneq ($(BR2_INET_IPV6),y)
|
|
CHRONY_CONF_OPT += --disable-ipv6
|
|
endif
|
|
|
|
define CHRONY_CONFIGURE_CMDS
|
|
cd $(@D) && $(TARGET_CONFIGURE_OPTS) ./configure $(CHRONY_CONF_OPT)
|
|
endef
|
|
|
|
define CHRONY_BUILD_CMDS
|
|
$(TARGET_MAKE_ENV) $(MAKE) -C $(@D)
|
|
endef
|
|
|
|
define CHRONY_INSTALL_TARGET_CMDS
|
|
$(TARGET_MAKE_ENV) $(MAKE) -C $(@D) DESTDIR="$(TARGET_DIR)" install
|
|
endef
|
|
|
|
$(eval $(generic-package))
|