drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in NTP
Name: |
Zwei Probleme in NTP |
|
ID: |
USN-4563-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 18.04 LTS |
|
Datum: |
Fr, 2. Oktober 2020, 07:36 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8936
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7182 |
|
Applikationen: |
NTP |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============3614060607315961639== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="QMmVWDlDySo1Ivn2G24a8R454tjcxFoan"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --QMmVWDlDySo1Ivn2G24a8R454tjcxFoan Content-Type: multipart/mixed; boundary="QknWZ5NJVeuiHB7rT812z7MJbPfbCSNAO"
--QknWZ5NJVeuiHB7rT812z7MJbPfbCSNAO Content-Type: text/plain; charset=utf-8 Content-Language: en-U Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-4563-1 October 01, 2020
ntp vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
Summary:
NTP could be made to crash.
Software Description: - ntp: Network Time Protocol daemon and utility programs
Details:
It was discovered that the fix for CVE-2018-7182 introduced a NULL pointer dereference into NTP. An attacker could use this vulnerability to cause a denial of service (crash).
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04 LTS: ntp 1:4.2.8p10+dfsg-5ubuntu7.3 ntpdate 1:4.2.8p10+dfsg-5ubuntu7.3 sntp 1:4.2.8p10+dfsg-5ubuntu7.3
In general, a standard system update will make all the necessary changes.
References: https://usn.ubuntu.com/4563-1 CVE-2019-8936
Package Information: https://launchpad.net/ubuntu/+source/ntp/1:4.2.8p10+dfsg-5ubuntu7.3
--QknWZ5NJVeuiHB7rT812z7MJbPfbCSNAO--
--QMmVWDlDySo1Ivn2G24a8R454tjcxFoan Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEE7MowLJorxPNkyBZZW+PTAFZKyRgFAl92UQAACgkQW+PTAFZK yRjPsBAA1PbUHDmBV1baVU6Q6ZwLjU3mwoQOBszrtY0x/iQE5V073rIyKqjmv63g s0by+MIzph6x+NSaCJc+h2EVMc9YhT+DT05FcNaOIYTpSW7cbUuMJtoyFr6dfeB6 47rksFwSDEDfHalkOlv+GklDMHpSeEIj2lin3HnndPN0KVRgU66DJ1AEI4G496Nc bQJXADOvwo84dkNeX74WXKFlFrJtWBYHQQvRQ6uTE5cMJEB2BrBTAjoX55eFbSJg B6OdpZEtKTLavEPnEG1dXvPJKR8ExTEoUTK4OJbyGFBEsNBtMUa7dl1YHAhNKCkH b6PZ0QpqimdKxEMsNXIhn36ge7CFaZwtLzjHN8wUDezPDmemZ3XpCOg+MlF5vx8q uJLzsmXO7iX9raFasT1vWBrLFZy7BO2vFtq5+SxVq3mb0IPc+ztnGR7h+b/73AJi gpROzhtn1issklvFjnbCvSgIwDDXmSNj9b8FnyqSih0SV34rpq4zOrMPl6aU1os0 8p5b/cqGmqdfj0yvQzBpXpMQm1wd6zgcN70DIWW5J7v06Haeo7E2ARe7XdW101bW L5xs8cK4pnfrieBbqacYiNRPXX55U2z7GdVugvvhYFMEM1w0Fcl+tHqbPto/HFp9 rhTTAtWhFyORqOfYyxZORdr0DevaxI7v8KCvzqx3i/XpCSokEjE= =dVvf -----END PGP SIGNATURE-----
--QMmVWDlDySo1Ivn2G24a8R454tjcxFoan--
--===============3614060607315961639== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK
--===============3614060607315961639==--
|
|
|
|