Uprev ntp to version 4.2.6p5-29.el7

This solves:
ntp: Stack-based buffer overflow in ntpq and ntpdc allows
denial of service or code execution (CVE-2018-12327)

See the announcement link:

https://lists.centos.org/pipermail/centos-cr-announce/2019-August/006016.html

for more details.

Change-Id: Ic92fd6af30bf05c6f40cb6a6c60e0bc3811ff22a
Partial-Bug: 1849197
Signed-off-by: Jim Somerville <Jim.Somerville@windriver.com>
This commit is contained in:
Jim Somerville 2019-11-25 15:51:29 -05:00
parent ea25ae6f26
commit d964e258be
1 changed files with 1 additions and 1 deletions

View File

@ -906,7 +906,7 @@ nss-sysinit-3.36.0-7.el7_5.x86_64.rpm
nss-tools-3.36.0-7.el7_5.x86_64.rpm
nss-util-3.36.0-1.el7_5.x86_64.rpm
nss-util-devel-3.36.0-1.el7_5.x86_64.rpm
ntp-4.2.6p5-28.el7.centos.src.rpm
ntp-4.2.6p5-29.el7.centos.src.rpm
numactl-devel-2.0.9-7.el7.x86_64.rpm
numactl-libs-2.0.9-7.el7.x86_64.rpm
objectweb-asm-3.3.1-9.el7.noarch.rpm