|
|
Subscribe / Log in / New account

Fedora alert FEDORA-2015-77bfbc1bcd (ntp)

From:  updates@fedoraproject.org
To:  package-announce@lists.fedoraproject.org
Subject:  [SECURITY] Fedora 21 Update: ntp-4.2.6p5-34.fc21
Date:  Wed, 4 Nov 2015 22:51:44 +0000 (UTC)
Message-ID:  <20151104225144.33F3A604C871@bastion01.phx2.fedoraproject.org>

-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2015-77bfbc1bcd 2015-11-04 18:17:28.541358 -------------------------------------------------------------------------------- Name : ntp Product : Fedora 21 Version : 4.2.6p5 Release : 34.fc21 URL : http://www.ntp.org Summary : The NTP daemon and utilities Description : The Network Time Protocol (NTP) is used to synchronize a computer's time with another reference time source. This package includes ntpd (a daemon which continuously adjusts system time) and utilities used to query and configure the ntpd daemon. Perl scripts ntp-wait and ntptrace are in the ntp-perl package, ntpdate is in the ntpdate package and sntp is in the sntp package. The documentation is in the ntp-doc package. -------------------------------------------------------------------------------- Update Information: Security fix for CVE-2015-7704, CVE-2015-5300, CVE-2015-7692, CVE-2015-7871, CVE-2015-7702, CVE-2015-7691, CVE-2015-7852, CVE-2015-7701 ---- Security fix for CVE-2015-5146, CVE-2015-5194, CVE-2015-5219, CVE-2015-5195, CVE-2015-5196 -------------------------------------------------------------------------------- References: [ 1 ] Bug #1274254 - CVE-2015-7691 CVE-2015-7692 CVE-2015-7702 ntp: incomplete checks in ntp_crypto.c https://bugzilla.redhat.com/show_bug.cgi?id=1274254 [ 2 ] Bug #1274255 - CVE-2015-7701 ntp: slow memory leak in CRYPTO_ASSOC https://bugzilla.redhat.com/show_bug.cgi?id=1274255 [ 3 ] Bug #1274261 - CVE-2015-7852 ntp: ntpq atoascii memory corruption vulnerability https://bugzilla.redhat.com/show_bug.cgi?id=1274261 [ 4 ] Bug #1274265 - CVE-2015-7871 ntp: crypto-NAK symmetric association authentication bypass vulnerability https://bugzilla.redhat.com/show_bug.cgi?id=1274265 [ 5 ] Bug #1271070 - CVE-2015-7704 ntp: disabling synchronization via crafted KoD packet https://bugzilla.redhat.com/show_bug.cgi?id=1271070 [ 6 ] Bug #1271076 - CVE-2015-5300 ntp: MITM attacker can force ntpd to make a step larger than the panic threshold https://bugzilla.redhat.com/show_bug.cgi?id=1271076 [ 7 ] Bug #1238136 - CVE-2015-5146 ntp: ntpd control message crash on crafted NUL-byte in configuration directive (VU#668167) https://bugzilla.redhat.com/show_bug.cgi?id=1238136 [ 8 ] Bug #1254542 - CVE-2015-5194 ntp: crash with crafted logconfig configuration command https://bugzilla.redhat.com/show_bug.cgi?id=1254542 [ 9 ] Bug #1254544 - CVE-2015-5195 ntp: ntpd crash when processing config commands with statistics type https://bugzilla.redhat.com/show_bug.cgi?id=1254544 [ 10 ] Bug #1254547 - CVE-2015-7703 ntp: config command can be used to set the pidfile and drift file paths https://bugzilla.redhat.com/show_bug.cgi?id=1254547 [ 11 ] Bug #1255118 - CVE-2015-5219 ntp: infinite loop in sntp processing crafted packet https://bugzilla.redhat.com/show_bug.cgi?id=1255118 -------------------------------------------------------------------------------- This update can be installed with the "yum" update program. Use su -c 'yum update ntp' at the command line. For more information, refer to "Managing Software with yum", available at https://docs.fedoraproject.org/yum/. All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-...


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds