Processing control commands:
> tags -1 + confirmed
Bug #969349 [release.debian.org] buster-pu: package chrony/3.4-4+deb10u1
Added tag(s) confirmed.
--
969349: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969349
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
Control: tags -1 + confirmed
On Wed, 2020-09-16 at 14:54 +0200, Vincent Blut wrote:
> Hi,
>
> On 2020-08-31T21:34+0200, Vincent Blut wrote:
[...]
> > chrony versions prior to 3.5.1 are vulnerable to a symlink race
> > when creating the PID file. CVE-2020-14367 has been assigned to
> > this vulner
Hi,
On 2020-08-31T21:34+0200, Vincent Blut wrote:
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi,
[ Reason ]
chrony versions prior to 3.5.1 are vulnerable to a symlink race
Package: release.debian.org
Severity: normal
Tags: buster
User: release.debian@packages.debian.org
Usertags: pu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi,
[ Reason ]
chrony versions prior to 3.5.1 are vulnerable to a symlink race when
creating the PID file. CVE-2020-14367 has been
4 matches
Mail list logo