You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa chrony

Sigurnosni nedostatak programskog paketa chrony

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2014-1916
2014-02-03 01:06:14
——————————————————————————–

Name : chrony
Product : Fedora 19
Version : 1.29.1
Release : 1.fc19
URL : http://chrony.tuxfamily.org
Summary : An NTP client/server
Description :
A client/server for the Network Time Protocol, this program keeps your
computer’s clock accurate. It was specially designed to support
systems with intermittent internet connections, but it also works well
in permanently connected environments. It can use also hardware reference
clocks, system real-time clock or manual input as time references.

——————————————————————————–
Update Information:

This update fixes the following security vulnerability:

– Modify chronyc protocol to prevent amplification attacks (CVE-2014-0021) (incompatible with previous protocol version, chronyc supports both)

——————————————————————————–
ChangeLog:

* Fri Jan 31 2014 Miroslav Lichvar <mlichvar@redhat.com> 1.29.1-1
– update to 1.29.1 (CVE-2014-0021)
– replace hardening build flags with _hardened_build
* Tue Nov 19 2013 Miroslav Lichvar <mlichvar@redhat.com> 1.29-3
– let systemd remove pid file (#974305)
* Thu Oct 3 2013 Miroslav Lichvar <mlichvar@redhat.com> 1.29-2
– add ordering dependency to not start chronyd before ntpd stopped
* Thu Aug 8 2013 Miroslav Lichvar <mlichvar@redhat.com> 1.29-1
– update to 1.29 (CVE-2012-4502, CVE-2012-4503)
* Sat Aug 3 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> – 1.28-2
– Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild
* Wed Jul 17 2013 Miroslav Lichvar <mlichvar@redhat.com> 1.28-1
– update to 1.28
– change default makestep limit to 10 seconds
* Mon Jun 24 2013 Miroslav Lichvar <mlichvar@redhat.com> 1.28-0.2.pre1
– buildrequire systemd-units
* Fri Jun 21 2013 Miroslav Lichvar <mlichvar@redhat.com> 1.28-0.1.pre1
– update to 1.28-pre1
– listen for commands only on localhost by default
——————————————————————————–
References:

[ 1 ] Bug #1054790 – CVE-2014-0021 chrony: DDoS via amplification in cmdmon protocol
https://bugzilla.redhat.com/show_bug.cgi?id=1054790
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update chrony’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorMarijo Plepelic
Cert idNCERT-REF-2014-02-0018-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa gnutls

Otkriven je sigurnosni nedostatak u programskom paketu gnutls za operacijski sustav Mandriva. Otkriveno je da postoji ranjivost prilikom provjere certifikata...

Close