|
|
Subscribe / Log in / New account

Mageia alert MGASA-2018-0371 (ntp)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2018-0371: Updated ntp packages fix security vulnerability
Date:  Thu, 13 Sep 2018 22:38:54 +0200
Message-ID:  <20180913203854.EB9C59FE21@duvel.mageia.org>

MGASA-2018-0371 - Updated ntp packages fix security vulnerability Publication date: 13 Sep 2018 URL: https://advisories.mageia.org/MGASA-2018-0371.html Type: security Affected Mageia releases: 6 CVE: CVE-2018-12327 Description: Updated ntp packages fix security vulnerability: Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter (CVE-2018-12327). References: - https://bugs.mageia.org/show_bug.cgi?id=23505 - https://lists.fedoraproject.org/archives/list/package-ann... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1... SRPMS: - 6/core/ntp-4.2.8p12-1.mga6


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds