|
From: freshmeat.net <no...@fr...> - 2009-05-19 00:06:30
|
Dear freshmeat.net subscriber, kostecke just announced version 4.2.4p7 of NTP on freshmeat.net. The changes are as follows: This release fixes CVE-2009-1252, "Remote exploit if autokey is enabled", a high-severity vulnerability that only affects users of Autokey Authentication. It fixes two low-severity vulnerabilities: CVE-2009-0159, a limited (two byte) buffer overflow in ntpq, and non-exclusive socket utilization on Windows. This release also includes improved logging, fixes and improvements for Windows, MacOS X, and Solaris, and support for AIX 6.1. This is a strongly recommended upgrade. Project description: The Network Time Protocol (NTP) is used to synchronize the time of a computer client or server to another server or reference time source, such as a radio or satellite receiver or modem. It provides client accuracies typically within a millisecond on LANs and up to a few tens of milliseconds on WANs relative to a primary server synchronized to Coordinated Universal Time (UTC) via a Global Positioning Service (GPS) receiver, for example. Detailed history and release notes are available here: http://freshmeat.net/projects/ntp#release_299622 If you want to change your subscription to this project, please log in to: http://freshmeat.net/account/subscriptions Best regards, freshmeat.net |