Results 1 to 4 of 4

Thread: NTP vulnerability

  1. #1
    Join Date
    Oct 2008
    Location
    ExodusHair<Čubura
    Beans
    Hidden!
    Distro
    Ubuntu Development Release

  2. #2
    Join Date
    Nov 2012
    Location
    Halloween Town
    Beans
    Hidden!
    Distro
    Xubuntu Development Release

  3. #3
    Join Date
    May 2007
    Location
    The New Forest
    Beans
    Hidden!
    Distro
    Xubuntu

    Re: NTP vulnerability

    Code:
    ntp (1:4.2.6.p5+dfsg-3ubuntu3) vivid; urgency=medium
    
      * SECURITY UPDATE: weak default key in config_auth()
        - debian/patches/CVE-2014-9293.patch: use openssl for random key in
          ntpd/ntp_config.c, ntpd/ntpd.c.
        - CVE-2014-9293
      * SECURITY UPDATE: non-cryptographic random number generator with weak
        seed used by ntp-keygen to generate symmetric keys
        - debian/patches/CVE-2014-9294.patch: use openssl for random key in
          include/ntp_random.h, libntp/ntp_random.c, util/ntp-keygen.c.
        - CVE-2014-9294
      * SECURITY UPDATE: buffer overflows in crypto_recv(), ctl_putdata(),
        configure()
        - debian/patches/CVE-2014-9295.patch: check lengths in
          ntpd/ntp_control.c, ntpd/ntp_crypto.c.
        - CVE-2014-9295
      * SECURITY UPDATE: missing return on error in receive()
        - debian/patches/CVE-2015-9296.patch: add missing return in
          ntpd/ntp_proto.c.
        - CVE-2014-9296
    
     -- Marc Deslauriers <marc.deslauriers@ubuntu.com>  Sat, 20 Dec 2014 05:47:10 -0500
    recent changelog for the ntp upgrade here today (ish)

  4. #4
    Join Date
    Oct 2008
    Location
    ExodusHair<Čubura
    Beans
    Hidden!
    Distro
    Ubuntu Development Release

    Re: NTP vulnerability

    Thank You, I was too busy to check changelog. Checked it now. Great.

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •