OVMSA-2015-0102 - ntp security update
Type: | SECURITY |
Severity: | NA |
Release Date: | 2015-07-29 |
Description
[4.2.6p5-5]
- reject packets without MAC when authentication is enabled (CVE-2015-1798)
- protect symmetric associations with symmetric key against DoS attack
(CVE-2015-1799)
- fix generation of MD5 keys with ntp-keygen on big-endian systems
(CVE-2015-3405)
- log when stepping clock for leap second or ignoring it with -x (#1204625)
[4.2.6p5-4]
- fix typos in ntpd man page (#1194463)
[4.2.6p5-3]
- validate lengths of values in extension fields (CVE-2014-9297)
- drop packets with spoofed source address ::1 (CVE-2014-9298)
- add nanosecond support to SHM refclock (#1117704)
- allow creating all SHM segments with owner-only access (#1122015)
- allow symmetric keys up to 32 bytes again (#1053551)
- fix calculation of root dispersion (#1045376)
- fix crash in ntpq mreadvar command (#1165141)
- don't step clock for leap second with -x option (#1190619)
- don't drop packets with source port below 123 (#1171630)
- use larger RSA exponent in ntp-keygen (#1184421)
- refresh peers on routing updates (#1193850)
- increase memlock limit again (#1053568)
- warn when monitor can't be disabled due to limited restrict (#1166596)
- improve documentation of restrict command (#1069019)
- update logconfig documentation for patched default (#1193849)
- don't build ntpsnmpd (#995134)
Related CVEs
Updated Packages
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
|
Oracle VM 3.3 (x86_64) | ntp-4.2.6p5-5.el6.src.rpm | e0dbd42921d58b33c5aeb5be912ed59b | OVMSA-2018-0290 |
| ntp-4.2.6p5-5.el6.x86_64.rpm | c32c6a99d57771e84f37e6c01c7f5a27 | OVMSA-2018-0290 |
| ntpdate-4.2.6p5-5.el6.x86_64.rpm | 12f030a135bfc56c1fb83c68b196b585 | OVMSA-2018-0290 |
This page is generated automatically and has not been checked for errors or omissions. For clarification
or corrections please contact the Oracle Linux ULN team