OVMSA-2015-0002 - ntp security update
Type: | SECURITY |
Severity: | IMPORTANT |
Release Date: | 2015-01-06 |
Description
[4.2.2p1-18.el5]
- don't generate weak control key for resolver (CVE-2014-9293)
- don't generate weak MD5 keys in ntp-keygen (CVE-2014-9294)
- fix buffer overflows via specially-crafted packets (CVE-2014-9295)
[4.2.2p1-17.el5]
- increase memlock limit again (#1035198)
[4.2.2p1-16.el5]
- allow selection of cipher for private key files (#741573)
[4.2.2p1-15.el5]
- revert init script priority (#470945, #689636)
- drop tentative patch (#489835)
- move restorecon call to %posttrans
[4.2.2p1-14.el5]
- call restorecon on ntpd and ntpdate on start (#470945)
[4.2.2p1-13.el5]
- don't crash with more than 512 local addresses (#661934)
- add -I option (#528799)
- fix -L option to not require argument (#460434)
- move ntpd and ntpdate to /sbin and start earlier on boot (#470945, #689636)
- increase memlock limit (#575874)
- ignore tentative addresses (#489835)
- print synchronization distance instead of dispersion in ntpstat (#679034)
- fix typos in ntpq and ntp-keygen man pages (#664524, #664525)
- clarify ntpd -q description (#591838)
- don't verify ntp.conf (#481151)
- replace Prereq tag
[4.2.2p1-12.el5]
- fix DoS with mode 7 packets (#532640, CVE-2009-3563)
- compile with -fno-strict-aliasing
[4.2.2p1-11.el5]
- fix buffer overflow when parsing Autokey association message
(#500784, CVE-2009-1252)
- fix buffer overflow in ntpq (#500784, CVE-2009-0159)
[4.2.2p1-10.el5]
- fix check for malformed signatures (#479699, CVE-2009-0021)
Related CVEs
Updated Packages
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
|
Oracle VM 2.2 (i386) | ntp-4.2.2p1-18.el5_11.src.rpm | e0ecb6037365f66a741afaa0085ca6bf | - |
| ntp-4.2.2p1-18.el5_11.i386.rpm | ee9c921630033c391afa4778910e4f68 | - |
This page is generated automatically and has not been checked for errors or omissions. For clarification
or corrections please contact the Oracle Linux ULN team