|
|
Subscribe / Log in / New account

Mageia alert MGASA-2016-0038 (chrony)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2016-0038: Updated chrony packages fix security vulnerability
Date:  Fri, 29 Jan 2016 12:03:24 +0100
Message-ID:  <20160129110324.E13BA5DA88@valstar.mageia.org>

MGASA-2016-0038 - Updated chrony packages fix security vulnerability Publication date: 29 Jan 2016 URL: http://advisories.mageia.org/MGASA-2016-0038.html Type: security Affected Mageia releases: 5 CVE: CVE-2016-1567 Description: In chrony before 1.31.2, when used with symmetric key encryption, the client would accept packets encrypted with keys for any configured server, allowing a server to impersonate other servers to clients, thus performing a man-in-the-middle attack (CVE-2016-1567). References: - https://bugs.mageia.org/show_bug.cgi?id=17605 - http://chrony.tuxfamily.org/news.html#_20_jan_2016_chrony... - http://www.talosintel.com/reports/TALOS-2016-0071/ - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1567 SRPMS: - 5/core/chrony-1.31.2-1.mga5


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds