Fedora 20: ntp Security Update

    Date22 Apr 2015
    CategoryFedora
    66
    Posted ByLinuxSecurity Advisories
    Security fix for CVE-2015-1799, CVE-2015-1798, #1210324
    --------------------------------------------------------------------------------
    Fedora Update Notification
    FEDORA-2015-5874
    2015-04-09 05:00:34
    --------------------------------------------------------------------------------
    
    Name        : ntp
    Product     : Fedora 20
    Version     : 4.2.6p5
    Release     : 22.fc20
    URL         : http://www.ntp.org
    Summary     : The NTP daemon and utilities
    Description :
    The Network Time Protocol (NTP) is used to synchronize a computer's
    time with another reference time source. This package includes ntpd
    (a daemon which continuously adjusts system time) and utilities used
    to query and configure the ntpd daemon.
    
    Perl scripts ntp-wait and ntptrace are in the ntp-perl package,
    ntpdate is in the ntpdate package and sntp is in the sntp package.
    The documentation is in the ntp-doc package.
    
    --------------------------------------------------------------------------------
    Update Information:
    
    Security fix for CVE-2015-1799, CVE-2015-1798, #1210324
    --------------------------------------------------------------------------------
    ChangeLog:
    
    * Tue Apr 14 2015 Miroslav Lichvar  4.2.6p5-22
    - fix generation of MD5 keys with ntp-keygen on big-endian systems (#1210324)
    * Wed Apr  8 2015 Miroslav Lichvar  4.2.6p5-21
    - reject packets without MAC when authentication is enabled (CVE-2015-1798)
    - protect symmetric associations with symmetric key against DoS attack
      (CVE-2015-1799)
    * Thu Feb  5 2015 Miroslav Lichvar  4.2.6p5-20
    - validate lengths of values in extension fields (CVE-2014-9297)
    - drop packets with spoofed source address ::1 (CVE-2014-9298)
    * Fri Dec 19 2014 Miroslav Lichvar  4.2.6p5-19
    - don't generate weak control key for resolver (CVE-2014-9293)
    - don't generate weak MD5 keys in ntp-keygen (CVE-2014-9294)
    - fix buffer overflows via specially-crafted packets (CVE-2014-9295)
    - don't mobilize passive association when authentication fails (CVE-2014-9296)
    * Mon Dec  9 2013 Miroslav Lichvar  4.2.6p5-18
    - fix calculation of root dispersion (#1037981)
    - refresh peers on routing updates (#1028176)
    - drop patch allowing -p and -u options to be used twice (#639101)
    - remove unnecessary IPv6 restrict line from default ntp.conf
    - replace hardening build flags with _hardened_build
    --------------------------------------------------------------------------------
    References:
    
      [ 1 ] Bug #1199435 - CVE-2015-1799 ntp: authentication doesn't protect symmetric associations against DoS attacks
            https://bugzilla.redhat.com/show_bug.cgi?id=1199435
      [ 2 ] Bug #1199430 - CVE-2015-1798 ntp: ntpd accepts unauthenticated packets with symmetric key crypto
            https://bugzilla.redhat.com/show_bug.cgi?id=1199430
      [ 3 ] Bug #1210324 - ntp: ntp-keygen may generate non-random symmetric keys on big-endian systems
            https://bugzilla.redhat.com/show_bug.cgi?id=1210324
    --------------------------------------------------------------------------------
    
    This update can be installed with the "yum" update program.  Use
    su -c 'yum update ntp' at the command line.
    For more information, refer to "Managing Software with yum",
    available at http://docs.fedoraproject.org/yum/.
    
    All packages are signed with the Fedora Project GPG key.  More details on the
    GPG keys used by the Fedora Project can be found at
    https://fedoraproject.org/keys
    --------------------------------------------------------------------------------
    _______________________________________________
    package-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://admin.fedoraproject.org/mailman/listinfo/package-announce
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"4","type":"x","order":"1","pct":57.14,"resources":[]},{"id":"88","title":"Should be more technical","votes":"2","type":"x","order":"2","pct":28.57,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"1","type":"x","order":"3","pct":14.29,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.