OVMSA-2014-0085

OVMSA-2014-0085 - ntp security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2014-12-23

Description


[4.2.6p5-2]
- don't generate weak control key for resolver (CVE-2014-9293)
- don't generate weak MD5 keys in ntp-keygen (CVE-2014-9294)
- fix buffer overflows via specially-crafted packets (CVE-2014-9295)
- don't mobilize passive association when authentication fails (CVE-2014-9296)


Related CVEs


CVE-2014-9293
CVE-2014-9294
CVE-2014-9295
CVE-2014-9296

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle VM 3.3 (x86_64) ntp-4.2.6p5-2.el6_6.src.rpmbbddcf587863c736604995f35bce0937e3d9d7b34fd802906c971464b017b913OVMSA-2018-0290ovm3_x86_64_3.3_patch
ntp-4.2.6p5-2.el6_6.x86_64.rpm188bf3bb51c182f41a5addb0069a2676c6f3aea36d0a2abb4d62d93f506f82f7OVMSA-2018-0290ovm3_x86_64_3.3_patch
ntpdate-4.2.6p5-2.el6_6.x86_64.rpm40b552e738300c462bd1a7896750b848a16e4a474e8566313cf2aebd7328e520OVMSA-2018-0290ovm3_x86_64_3.3_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete