Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in NTP
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in NTP
ID: FEDORA-2015-f5f5ec7b6b
Distribution: Fedora
Plattformen: Fedora 23
Datum: Mo, 2. November 2015, 23:06
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704
Applikationen: NTP

Originalnachricht

Name        : ntp
Product : Fedora 23
Version : 4.2.6p5
Release : 34.fc23
URL : http://www.ntp.org
Summary : The NTP daemon and utilities
Description :
The Network Time Protocol (NTP) is used to synchronize a computer's
time with another reference time source. This package includes ntpd
(a daemon which continuously adjusts system time) and utilities used
to query and configure the ntpd daemon.

Perl scripts ntp-wait and ntptrace are in the ntp-perl package,
ntpdate is in the ntpdate package and sntp is in the sntp package.
The documentation is in the ntp-doc package.

-------------------------------------------------------------------------------
-
Update Information:

Security fix for CVE-2015-7704, CVE-2015-5300, CVE-2015-7692, CVE-2015-7871,
CVE-2015-7702, CVE-2015-7691, CVE-2015-7852, CVE-2015-7701
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1274254 - CVE-2015-7691 CVE-2015-7692 CVE-2015-7702 ntp:
incomplete checks in ntp_crypto.c
https://bugzilla.redhat.com/show_bug.cgi?id=1274254
[ 2 ] Bug #1274255 - CVE-2015-7701 ntp: slow memory leak in CRYPTO_ASSOC
https://bugzilla.redhat.com/show_bug.cgi?id=1274255
[ 3 ] Bug #1274261 - CVE-2015-7852 ntp: ntpq atoascii memory corruption
vulnerability
https://bugzilla.redhat.com/show_bug.cgi?id=1274261
[ 4 ] Bug #1274265 - CVE-2015-7871 ntp: crypto-NAK symmetric association
authentication bypass vulnerability
https://bugzilla.redhat.com/show_bug.cgi?id=1274265
[ 5 ] Bug #1271070 - CVE-2015-7704 ntp: disabling synchronization via crafted
KoD packet
https://bugzilla.redhat.com/show_bug.cgi?id=1271070
[ 6 ] Bug #1271076 - CVE-2015-5300 ntp: MITM attacker can force ntpd to make
a step larger than the panic threshold
https://bugzilla.redhat.com/show_bug.cgi?id=1271076
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update ntp' at the command line.
For more information, refer to "Managing Software with yum",
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Gewinnspiel
Neue Nachrichten
Werbung