CVE-2019-15522

NameCVE-2019-15522
DescriptionAn issue was discovered in LINBIT csync2 through 2.0. csync_daemon_session in daemon.c neglects to force a failure of a hello command when the configuration requires use of SSL.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh
Debian Bugs955445

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
csync2 (PTS)jessie1.34-2.3vulnerable
stretch2.0-8-g175a01c-4vulnerable
bullseye, sid, buster2.0-22-gce67c55-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
csync2source(unstable)(unfixed)955445

Notes

[buster] - csync2 <no-dsa> (Minor issue)
[stretch] - csync2 <no-dsa> (Minor issue)
https://github.com/LINBIT/csync2/pull/13/commits/0ecfc333da51575f188dd7cf6ac4974d13a800b1

Search for package or bug name: Reporting problems