Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1746507251.13758094.1376035937778.JavaMail.root@redhat.com>
Date: Fri, 9 Aug 2013 04:12:17 -0400 (EDT)
From: Jan Lieskovsky <jlieskov@...hat.com>
To: oss-security@...ts.openwall.com
Cc: "Steven M. Christey" <coley@...us.mitre.org>,
        Miroslav Lichvar <mlichvar@...hat.com>,
        Florian Weimer <fweimer@...hat.com>
Subject: [Not a CVE request, just notification] CVE-2012-4502, CVE-2012-4503
 -- Two security flaws fixed in Chrony v1.29

Hello Kurt, Steve, vendors,

  Chrony upstream has released v1.29 version, correcting two security flaws:

* Issue #1: CVE-2012-4502: Buffer overflow when processing crafted command packets

  This issue was found by Florian Weimer of Red Hat.

  Relevant patch: http://git.tuxfamily.org/chrony/chrony.git/?p=chrony/chrony.git;a=commitdiff;h=7712455d9aa33d0db0945effaa07e900b85987b1
  Announcement: http://permalink.gmane.org/gmane.comp.time.chrony.announce/15
  Red Hat bug: https://bugzilla.redhat.com/show_bug.cgi?id=846392

* Issue #2: CVE-2012-4503: Uninitialized data in command replies

  This issue was found by Miroslav Lichvar of Red Hat.
 
  Relevant patch: http://git.tuxfamily.org/chrony/chrony.git/?p=chrony/chrony.git;a=commitdiff;h=c6fdeeb6bb0b17dc28c19ae492c4a1c498e54ea3
  Announcement: http://permalink.gmane.org/gmane.comp.time.chrony.announce/15
  Red Hat bug: https://bugzilla.redhat.com/show_bug.cgi?id=846392

Thank you && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.