Uprev ntp to version 4.2.6p5-29.el7
This solves: ntp: Stack-based buffer overflow in ntpq and ntpdc allows denial of service or code execution (CVE-2018-12327) See the announcement link: https://lists.centos.org/pipermail/centos-cr-announce/2019-August/006016.html for more details. Change-Id: Ic92fd6af30bf05c6f40cb6a6c60e0bc3811ff22a Partial-Bug: 1849197 Signed-off-by: Jim Somerville <Jim.Somerville@windriver.com>
This commit is contained in:
parent
ea25ae6f26
commit
d964e258be
|
@ -906,7 +906,7 @@ nss-sysinit-3.36.0-7.el7_5.x86_64.rpm
|
|||
nss-tools-3.36.0-7.el7_5.x86_64.rpm
|
||||
nss-util-3.36.0-1.el7_5.x86_64.rpm
|
||||
nss-util-devel-3.36.0-1.el7_5.x86_64.rpm
|
||||
ntp-4.2.6p5-28.el7.centos.src.rpm
|
||||
ntp-4.2.6p5-29.el7.centos.src.rpm
|
||||
numactl-devel-2.0.9-7.el7.x86_64.rpm
|
||||
numactl-libs-2.0.9-7.el7.x86_64.rpm
|
||||
objectweb-asm-3.3.1-9.el7.noarch.rpm
|
||||
|
|
Loading…
Reference in New Issue