|
|
Subscribe / Log in / New account

Mageia alert MGASA-2015-0418 (ntp)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2015-0418: Updated ntp package fixes security vulnerabilities
Date:  Fri, 30 Oct 2015 21:11:42 +0100
Message-ID:  <20151030201142.51CD540C02@valstar.mageia.org>

MGASA-2015-0418 - Updated ntp package fixes security vulnerabilities Publication date: 30 Oct 2015 URL: http://advisories.mageia.org/MGASA-2015-0418.html Type: security Affected Mageia releases: 5 CVE: CVE-2015-7850, CVE-2015-7853, CVE-2015-7855 Description: Yves Younan discovered that NTP incorrectly handled logfile and keyfile directives. In a non-default configuration, a remote authenticated attacker could possibly use this issue to cause NTP to enter a loop, resulting in a denial of service (CVE-2015-7850). Yves Younan discovered that NTP incorrectly handled reference clock memory. A malicious refclock could possibly use this issue to cause NTP to crash, resulting in a denial of service, or possibly execute arbitrary code (CVE-2015-7853). John D "Doug" Birdwell discovered that NTP incorrectly handled decoding certain bogus values. An attacker could possibly use this issue to cause NTP to crash, resulting in a denial of service (CVE-2015-7855). References: - https://bugs.mageia.org/show_bug.cgi?id=17041 - http://support.ntp.org/bin/view/Main/SecurityNotice#Octob... - http://www.ubuntu.com/usn/usn-2783-1/ - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7853 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855 SRPMS: - 5/core/ntp-4.2.6p5-24.3.mga5


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds