Linux Security
    Linux Security
    Linux Security

    Debian: UPDATE: ntp denial of service

    Posted By
    Previous advisory introduced apotential denial of service attack.
    Debian Security Advisory DSA-045-2                       This email address is being protected from spambots. You need JavaScript enabled to view it.                                Michael Stone
    April 9, 2001
    Package: ntp
    Vulnerability: remote root exploit
    Debian-specific: no
    Przemyslaw Frasunek <This email address is being protected from spambots. You need JavaScript enabled to view it.> reported that ntp
    daemons such as that released with Debian GNU/Linux are vulnerable to a
    buffer overflow that can lead to a remote root exploit. A previous
    advisory (DSA-045-1) partially addressed this issue, but introduced a
    potential denial of service attack. This has been corrected for Debian
    2.2 (potato) in ntp version 4.0.99g-2potato2.
    We recommend you upgrade your ntp package immediately.
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 2.2 alias potato
      Potato was released for the alpha, arm, i386, m68k, powerpc and sparc
      Source archives:
          MD5 checksum: 33eced8dfeecefed9ecd7a5425dce07f
          MD5 checksum: b704b4528c96b6b22ff2809cd551c221
          MD5 checksum: 6f3132fb4f6a3ee411554d09270f562a
      Architecture-independent files:
          MD5 checksum: cfa7f1a427fb65dc85eca68f823c95d7
          MD5 checksum: 3216aeca42720cd2b00f19ef05dc4ff8
      Alpha architecture:
          MD5 checksum: 09b2b4720a150be0421d3126de807b21
          MD5 checksum: 31d07aa810aa1b6b3a146e75ddb1fc6a
      ARM architecture:
          MD5 checksum: a099db2427b225e880da87c560bfb5b3
          MD5 checksum: fb8f5f35fc3b9f3db0d17c7fb302c6dd
      Intel ia32 architecture:
          MD5 checksum: 2a01903f179ccc41a87a8c9495f06747
          MD5 checksum: 915a79c8724151e0adf430ca57ad9844
      Motorola 680x0 architecture:
          MD5 checksum: dc3826e35dafd4163062f149a63f2bbe
          MD5 checksum: 6666baa200509e76e0c32dd0166bcb79
      PowerPC architecture:
          MD5 checksum: 8387ad0831907e26566b2d329425d0e1
          MD5 checksum: 5d90bf20314abc66efe7fea2ecb521d7
      Sun Sparc architecture:
          MD5 checksum: b014f4a20d4a0c2ec5e788fafc7dd3cd
          MD5 checksum: abe31f82a9b202b8880b51b97327cc3b
      These files will be moved into*/binary-$arch/ soon.
    For not yet released architectures please refer to the appropriate
    directory$arch/ .
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and


    LinuxSecurity Poll

    Tails is the most secure Linux distro out there.

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    [{"id":"142","title":"Yes - Tails get my vote!","votes":"1","type":"x","order":"1","pct":100,"resources":[]},{"id":"143","title":"Nope - Parrot OS has surpassed Tails in its security and privacy.","votes":"0","type":"x","order":"2","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.