Lucene search

K
mageiaGentoo FoundationMGASA-2014-0052
HistoryFeb 12, 2014 - 2:13 a.m.

Updated chrony package fixes security vulnerability

2014-02-1202:13:17
Gentoo Foundation
advisories.mageia.org
10

0.024 Low

EPSS

Percentile

89.8%

Updated chrony package fixes security vulnerability: In the chrony control protocol some replies are significantly larger than their requests, which allows an attacker to use it in an amplification attack (CVE-2014-0021). Note: in the default configuration, cmdallow is restricted to localhost, so significant amplification is only possible if the configuration has been changed to allow cmdallow from other hosts. Even from hosts whose access is denied, minor amplification is still possible.

OSVersionArchitecturePackageVersionFilename
Mageia4noarchchrony< 1.29.1-1chrony-1.29.1-1.mga4

0.024 Low

EPSS

Percentile

89.8%