Processed: Re: Bug#969349: buster-pu: package chrony/3.4-4+deb10u1

2020-09-17 Thread Debian Bug Tracking System
Processing control commands: > tags -1 + confirmed Bug #969349 [release.debian.org] buster-pu: package chrony/3.4-4+deb10u1 Added tag(s) confirmed. -- 969349: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969349 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems

Bug#969349: buster-pu: package chrony/3.4-4+deb10u1

2020-09-17 Thread Adam D. Barratt
Control: tags -1 + confirmed On Wed, 2020-09-16 at 14:54 +0200, Vincent Blut wrote: > Hi, > > On 2020-08-31T21:34+0200, Vincent Blut wrote: [...] > > chrony versions prior to 3.5.1 are vulnerable to a symlink race > > when creating the PID file. CVE-2020-14367 has been assigned to > > this vulner

Bug#969349: buster-pu: package chrony/3.4-4+deb10u1

2020-09-16 Thread Vincent Blut
Hi, On 2020-08-31T21:34+0200, Vincent Blut wrote: Package: release.debian.org Severity: normal Tags: buster User: release.debian@packages.debian.org Usertags: pu -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi, [ Reason ] chrony versions prior to 3.5.1 are vulnerable to a symlink race

Bug#969349: buster-pu: package chrony/3.4-4+deb10u1

2020-08-31 Thread Vincent Blut
Package: release.debian.org Severity: normal Tags: buster User: release.debian@packages.debian.org Usertags: pu -BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi, [ Reason ] chrony versions prior to 3.5.1 are vulnerable to a symlink race when creating the PID file. CVE-2020-14367 has been