Mehrere Probleme in NTP
ID: | FEDORA-2016-8bb1932088 |
Distribution: | Fedora |
Plattformen: | Fedora 23 |
Datum: | So, 31. Januar 2016, 10:52 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158 |
Applikationen: | NTP |
Originalnachricht |
|
Name : ntp Product : Fedora 23 Version : 4.2.6p5 Release : 36.fc23 URL : http://www.ntp.org Summary : The NTP daemon and utilities Description : The Network Time Protocol (NTP) is used to synchronize a computer's time with another reference time source. This package includes ntpd (a daemon which continuously adjusts system time) and utilities used to query and configure the ntpd daemon. Perl scripts ntp-wait and ntptrace are in the ntp-perl package, ntpdate is in the ntpdate package and sntp is in the sntp package. The documentation is in the ntp-doc package. -------------------------------------------------------------------------------- Update Information: Security fix for CVE-2015-7974, CVE-2015-8138, CVE-2015-7977, CVE-2015-7978, CVE-2015-7979, CVE-2015-8158 -------------------------------------------------------------------------------- References: [ 1 ] Bug #1297471 - CVE-2015-7974 ntp: missing key check allows impersonation between authenticated peers (VU#357792) https://bugzilla.redhat.com/show_bug.cgi?id=1297471 [ 2 ] Bug #1299442 - CVE-2015-8138 ntp: missing check for zero originate timestamp https://bugzilla.redhat.com/show_bug.cgi?id=1299442 [ 3 ] Bug #1300269 - CVE-2015-7977 ntp: restriction list NULL pointer dereference https://bugzilla.redhat.com/show_bug.cgi?id=1300269 [ 4 ] Bug #1300270 - CVE-2015-7978 ntp: stack exhaustion in recursive traversal of restriction list https://bugzilla.redhat.com/show_bug.cgi?id=1300270 [ 5 ] Bug #1300271 - CVE-2015-7979 ntp: off-path denial of service on authenticated broadcast mode https://bugzilla.redhat.com/show_bug.cgi?id=1300271 [ 6 ] Bug #1300273 - CVE-2015-8158 ntp: potential infinite loop in ntpq https://bugzilla.redhat.com/show_bug.cgi?id=1300273 -------------------------------------------------------------------------------- This update can be installed with the "yum" update program. Use su -c 'yum update ntp' at the command line. For more information, refer to "Managing Software with yum", available at https://docs.fedoraproject.org/yum/. All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce |