[OmniOS-discuss] Fwd: New NTP release [VU#633847]

Dan McDonald danmcd at omniti.com
Mon Nov 21 19:32:46 UTC 2016


Repos for all supported releases (r151014, r151018, r151020) have been updated.  The next bloody update will have it as well, when it ships.

This is a non-rebooting update, but it will create a backup BE by default unless you specify --no-backup-be in pkg(1).

Dan


> Begin forwarded message:
> 
> From: CERT Coordination Center <cert at cert.org>
> Subject: New NTP release [VU#633847]
> Date: November 21, 2016 at 12:13:05 PM EST
> To: Dan McDonald <danmcd at omniti.com>
> Cc: CERT Coordination Center <cert at cert.org>
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> 
> Greetings,
> 
> Today the NTP Project's ntp-4.2.8p9 was released, fixing several vulnerabilities. We have published a Vulnerability Note summary as VU#633847; the full NTP.org release notes are at <http://support.ntp.org/bin/view/Main/SecurityNotice#November_2016_ntp_4_2_8p9_NTP_Se>.
> 
> We are forwarding this information to you as part of our wide-distribution notices.
> 
> If you have any questions or comments, please let us know. Please include VU#633847 in the subject line of your email.
> 
> Best Regards,
> 
> Vulnerability Analysis Team
> ==========================================================
> CERT(R) Coordination Center    |             cert at cert.org
> Software Engineering Institute | Hotline : +1 412.268.7090
> Carnegie Mellon University     |     FAX : +1 412.268.6989
> Pittsburgh, PA 15213-3890      |      http://www.cert.org/
> ==========================================================
> 
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2.0.22 (GNU/Linux)
> 
> iQIcBAEBAgAGBQJYMyr4AAoJEOaVDwyMMQJnFVMP/A+p7QETDxfDuFC7gqfIvGnI
> KM1tLa1K/p0wH0vHRmNZtt6M9mzJbECt5Ghnx5KUi5Q1DlfxYzR1UsVY01WH8B6l
> 47bNxDkLy1uKzOjGgcSKp83FmF9j5ybTBJsT/K2Z5KNwyyZimCYIW/ml4kYNG8MJ
> 9c3njVva46bAEWBi1cqZQswUMuOxPDYKFvyHDNHat3fLrSYglNxA0jcNPEQPFfTq
> +aYh32kQaHhn7uMj/AhgW+8j+WURxInacISR6qlsXVDof/MCQwqUE/can1zsBZO3
> lmNfzg4xmPga6voBUsDy3cI2Uc6CZcMB3UBXfruqSZ+N+IYBXRwRcs5ybo4LaR2E
> pu5JDufvok4SxmgcVHVZXq08OVT5yerzea+eLfF13dQ52NrLi19wV2xPOVB4uQkd
> Pbha1wNdv567tGJmt9Zqp7nFn5EGDQZ0BlpeaegFFuZsZsyzVS1ZFRNAZwt6veew
> fXz1VBdMkMVsrRjyndeDlYmW+1wI7R9kNvEMgAtY9PziRxoe+mMkWPGwBnEyQdyr
> r5t1347OTGbyV9AsnhVVI+rwv2U8MMUp7atNg24GdgIi8ZqK2oHQlHLNCe5jLm3o
> xyH4UKMmn062foR+eO86eaLf8FyP+rgVsAPvKXLJiPUKLowqEHAw1cQLkml1PsTx
> dZ3jiJAkyGDroFL1a/Pz
> =/jIB
> -----END PGP SIGNATURE-----

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://omniosce.org/ml-archive/attachments/20161121/5a410030/attachment-0001.html>


More information about the OmniOS-discuss mailing list