CVE-2019-15522

NameCVE-2019-15522
DescriptionAn issue was discovered in LINBIT csync2 through 2.0. csync_daemon_session in daemon.c neglects to force a failure of a hello command when the configuration requires use of SSL.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs955445

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
csync2 (PTS)buster2.0-22-gce67c55-1+deb10u1fixed
bullseye2.0-25-gc0faaf9-1fixed
sid, trixie, bookworm2.0-42-g83b3644-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
csync2sourcestretch2.0-8-g175a01c-4+deb9u1
csync2sourcebuster2.0-22-gce67c55-1+deb10u1
csync2source(unstable)2.0-25-gc0faaf9-1955445

Notes

[jessie] - csync2 <no-dsa> (Minor issue)
https://github.com/LINBIT/csync2/pull/13/commits/0ecfc333da51575f188dd7cf6ac4974d13a800b1

Search for package or bug name: Reporting problems