drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in chrony
Name: |
Zwei Probleme in chrony |
|
ID: |
FEDORA-2013-14549 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 19 |
|
Datum: |
Mo, 12. August 2013, 06:32 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4502
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4503 |
|
Applikationen: |
chrony |
|
Originalnachricht |
Name : chrony Product : Fedora 19 Version : 1.29 Release : 1.fc19 URL : http://chrony.tuxfamily.org Summary : An NTP client/server Description : A client/server for the Network Time Protocol, this program keeps your computer's clock accurate. It was specially designed to support systems with intermittent internet connections, but it also works well in permanently connected environments. It can use also hardware reference clocks, system real-time clock or manual input as time references.
------------------------------------------------------------------------------- - Update Information:
This update fixes two security vulnerabilities: a crash when processing crafted commands (CVE-2012-4502) and uninitialized data sent in command replies (CVE-2012-4503). ------------------------------------------------------------------------------- - ChangeLog:
* Thu Aug 8 2013 Miroslav Lichvar <mlichvar@redhat.com> 1.29-1 - update to 1.29 (CVE-2012-4502, CVE-2012-4503) * Sat Aug 3 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 1.28-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild * Wed Jul 17 2013 Miroslav Lichvar <mlichvar@redhat.com> 1.28-1 - update to 1.28 - change default makestep limit to 10 seconds * Mon Jun 24 2013 Miroslav Lichvar <mlichvar@redhat.com> 1.28-0.2.pre1 - buildrequire systemd-units * Fri Jun 21 2013 Miroslav Lichvar <mlichvar@redhat.com> 1.28-0.1.pre1 - update to 1.28-pre1 - listen for commands only on localhost by default ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #846392 - CVE-2012-4502 CVE-2012-4503 chrony: Two security flaws fixed in chrony-1.29 release https://bugzilla.redhat.com/show_bug.cgi?id=846392 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update chrony' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|