Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in NTP
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in NTP
ID: FEDORA-2015-1736
Distribution: Fedora
Plattformen: Fedora 21
Datum: So, 15. Februar 2015, 11:34
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9297
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9298
Applikationen: NTP

Originalnachricht

Name        : ntp
Product : Fedora 21
Version : 4.2.6p5
Release : 27.fc21
URL : http://www.ntp.org
Summary : The NTP daemon and utilities
Description :
The Network Time Protocol (NTP) is used to synchronize a computer's
time with another reference time source. This package includes ntpd
(a daemon which continuously adjusts system time) and utilities used
to query and configure the ntpd daemon.

Perl scripts ntp-wait and ntptrace are in the ntp-perl package,
ntpdate is in the ntpdate package and sntp is in the sntp package.
The documentation is in the ntp-doc package.

-------------------------------------------------------------------------------
-
Update Information:

Security fix for CVE-2014-9297, CVE-2014-9298
-------------------------------------------------------------------------------
-
ChangeLog:

* Thu Feb 5 2015 Miroslav Lichvar <mlichvar@redhat.com> 4.2.6p5-27
- validate lengths of values in extension fields (CVE-2014-9297)
- drop packets with spoofed source address ::1 (CVE-2014-9298)
* Thu Jan 29 2015 Miroslav Lichvar <mlichvar@redhat.com> 4.2.6p5-26
- require timedatex (#1136905)
* Fri Dec 19 2014 Miroslav Lichvar <mlichvar@redhat.com> 4.2.6p5-25
- don't generate weak control key for resolver (CVE-2014-9293)
- don't generate weak MD5 keys in ntp-keygen (CVE-2014-9294)
- fix buffer overflows via specially-crafted packets (CVE-2014-9295)
- don't mobilize passive association when authentication fails
(CVE-2014-9296)
* Tue Nov 4 2014 Miroslav Lichvar <mlichvar@redhat.com> 4.2.6p5-24
- use network-online target in ntpdate and sntp services (#1116474)
- move sntp kod database to allow SELinux labeling
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1184572 - CVE-2014-9298 ntp: drop packets with source address ::1
https://bugzilla.redhat.com/show_bug.cgi?id=1184572
[ 2 ] Bug #1184573 - CVE-2014-9297 ntp: vallen in extension fields are not
validated
https://bugzilla.redhat.com/show_bug.cgi?id=1184573
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update ntp' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung