CVE-2019-15522

NameCVE-2019-15522
DescriptionAn issue was discovered in LINBIT csync2 through 2.0. csync_daemon_session in daemon.c neglects to force a failure of a hello command when the configuration requires use of SSL.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh
Debian Bugs955445

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
csync2 (PTS)jessie1.34-2.3vulnerable
stretch2.0-8-g175a01c-4vulnerable
buster2.0-22-gce67c55-1+deb10u1fixed
bullseye, sid2.0-25-gc0faaf9-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
csync2source(unstable)2.0-25-gc0faaf9-1955445
csync2sourcebuster2.0-22-gce67c55-1+deb10u1

Notes

[stretch] - csync2 <no-dsa> (Minor issue)
[jessie] - csync2 <no-dsa> (Minor issue)
https://github.com/LINBIT/csync2/pull/13/commits/0ecfc333da51575f188dd7cf6ac4974d13a800b1

Search for package or bug name: Reporting problems