OVMSA-2014-0085 - ntp security update
Type: | SECURITY |
Impact: | IMPORTANT |
Release Date: | 2014-12-23 |
Description
[4.2.6p5-2]
- don't generate weak control key for resolver (CVE-2014-9293)
- don't generate weak MD5 keys in ntp-keygen (CVE-2014-9294)
- fix buffer overflows via specially-crafted packets (CVE-2014-9295)
- don't mobilize passive association when authentication fails (CVE-2014-9296)
Related CVEs
Updated Packages
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
|
Oracle VM 3.3 (x86_64) | ntp-4.2.6p5-2.el6_6.src.rpm | bbddcf587863c736604995f35bce0937e3d9d7b34fd802906c971464b017b913 | OVMSA-2018-0290 | ovm3_x86_64_3.3_patch |
| ntp-4.2.6p5-2.el6_6.x86_64.rpm | 188bf3bb51c182f41a5addb0069a2676c6f3aea36d0a2abb4d62d93f506f82f7 | OVMSA-2018-0290 | ovm3_x86_64_3.3_patch |
| ntpdate-4.2.6p5-2.el6_6.x86_64.rpm | 40b552e738300c462bd1a7896750b848a16e4a474e8566313cf2aebd7328e520 | OVMSA-2018-0290 | ovm3_x86_64_3.3_patch |
This page is generated automatically and has not been checked for errors or omissions. For clarification
or corrections please contact the Oracle Linux ULN team