OVMSA-2015-0102

OVMSA-2015-0102 - ntp security update

Type:SECURITY
Severity:NA
Release Date:2015-07-29

Description


[4.2.6p5-5]
- reject packets without MAC when authentication is enabled (CVE-2015-1798)
- protect symmetric associations with symmetric key against DoS attack
(CVE-2015-1799)
- fix generation of MD5 keys with ntp-keygen on big-endian systems
(CVE-2015-3405)
- log when stepping clock for leap second or ignoring it with -x (#1204625)

[4.2.6p5-4]
- fix typos in ntpd man page (#1194463)

[4.2.6p5-3]
- validate lengths of values in extension fields (CVE-2014-9297)
- drop packets with spoofed source address ::1 (CVE-2014-9298)
- add nanosecond support to SHM refclock (#1117704)
- allow creating all SHM segments with owner-only access (#1122015)
- allow symmetric keys up to 32 bytes again (#1053551)
- fix calculation of root dispersion (#1045376)
- fix crash in ntpq mreadvar command (#1165141)
- don't step clock for leap second with -x option (#1190619)
- don't drop packets with source port below 123 (#1171630)
- use larger RSA exponent in ntp-keygen (#1184421)
- refresh peers on routing updates (#1193850)
- increase memlock limit again (#1053568)
- warn when monitor can't be disabled due to limited restrict (#1166596)
- improve documentation of restrict command (#1069019)
- update logconfig documentation for patched default (#1193849)
- don't build ntpsnmpd (#995134)


Related CVEs


CVE-2014-9297
CVE-2014-9298
CVE-2015-1798
CVE-2015-1799
CVE-2015-3405

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle VM 3.3 (x86_64) ntp-4.2.6p5-5.el6.src.rpme0dbd42921d58b33c5aeb5be912ed59bOVMSA-2018-0290
ntp-4.2.6p5-5.el6.x86_64.rpmc32c6a99d57771e84f37e6c01c7f5a27OVMSA-2018-0290
ntpdate-4.2.6p5-5.el6.x86_64.rpm12f030a135bfc56c1fb83c68b196b585OVMSA-2018-0290



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete