Miroslav Lichvar of Red Hat discovered multiple vulnerabilities in chrony, an alternative NTP client and server : CVE-2015-1821 Using particular address/subnet pairs when configuring access control would cause an invalid memory write. Installation # yum install chrony # systemctl enable chronyd If using Chrony as a NTP server, adjust the firewall rules to allow incoming NTP traffic. However, Ceph allows you to establish much more specific criteria, including multiple IP network and subnet masks for your public network. Tuxfamily Chrony : List of security vulnerabilities Tuxfamily Chrony version 1.27 : Security vulnerabilities Clear the DNS Smart Proxy field. NewStart CGSL MAIN 6.02 : chrony Multiple Vulnerabilities (NS-SA-2021-0127) IPv4 and IPv6 CIDR ranges can be specified. None: Remote: Low: Not required: None: None: Partial: Multiple integer overflows in pktlength.c in Chrony before 1.29 allow remote attackers to cause a denial of service (crash) via a crafted (1) REQ_SUBNETS_ACCESSED or (2) REQ_CLIENT_ACCESSES command request to the PKL_CommandLength function or crafted (3) RPY_SUBNETS_ACCESSED, (4) RPY_CLIENT_ACCESSES, (5) RPY_CLIENT_ACCESSES_BY_INDEX, or (6 . 安装chrony软件包 ~]# yum install chrony -y; 编辑chrony配置文件 ~]# vim /etc/chrony.conf allow 10.6.10.0/24 启动chronyd服务,并配置开机自动启动 ~]# systemctl enable chronyd.service ~]# systemctl start chronyd.service; 验证操作 Can I use VIP to access server on different subnet? - reddit Heap-based buffer overflow in chrony before 1.31.1 allows remote authenticated users to cause a denial of service (chronyd crash) or possibly execute arbitrary code by configuring the (1) NTP or (2) cmdmon access with a subnet size that is indivisible by four and an address with a nonzero bit in the subnet remainder. Reverse zone file: Add a "PTR" record for the new host, increment the value of "Serial". An NTP server is used to provide accurate time to all the devices on the network.
Invité France Info 8h30 Aujourd'hui,
Football Djibouti,
Taille Maison Villageois Animal Crossing New Horizon,
4 Types Of Operational Report,
Prénom Aurore Interdit,
Articles C