You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa chrony

Sigurnosni nedostatak programskog paketa chrony

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

Fedora Update Notification
2014-02-03 01:07:31

Name : chrony
Product : Fedora 20
Version : 1.29.1
Release : 1.fc20
Summary : An NTP client/server
Description :
A client/server for the Network Time Protocol, this program keeps your
computer’s clock accurate. It was specially designed to support
systems with intermittent internet connections, but it also works well
in permanently connected environments. It can use also hardware reference
clocks, system real-time clock or manual input as time references.

Update Information:

This update fixes the following security vulnerability:

– Modify chronyc protocol to prevent amplification attacks (CVE-2014-0021) (incompatible with previous protocol version, chronyc supports both)


* Fri Jan 31 2014 Miroslav Lichvar <> 1.29.1-1
– update to 1.29.1 (CVE-2014-0021)
– replace hardening build flags with _hardened_build
* Tue Nov 19 2013 Miroslav Lichvar <> 1.29-3
– let systemd remove pid file (#974305)
* Thu Oct 3 2013 Miroslav Lichvar <> 1.29-2
– add ordering dependency to not start chronyd before ntpd stopped

[ 1 ] Bug #1054790 – CVE-2014-0021 chrony: DDoS via amplification in cmdmon protocol

This update can be installed with the “yum” update program. Use
su -c ‘yum update chrony’ at the command line.
For more information, refer to “Managing Software with yum”,
available at

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list

AutorMarko Stanec
Cert idNCERT-REF-2014-02-0019-ADV
More in Preporuke
Sigurnosni nedostaci programskog paketa pidgin

Otkriveni su sigurnosni nedostaci u programskom paketu pidgin za operacijski sustav Fedora. Otkriveni nedostaci potencijalnim napadačima omogućuju izvođenje napada uskraćivanja...