[SECURITY] Fedora 23 Update: ntp-4.2.6p5-34.fc23

updates at fedoraproject.org updates at fedoraproject.org
Mon Nov 2 18:55:43 UTC 2015


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2015-f5f5ec7b6b
2015-11-02 17:42:58.181594
--------------------------------------------------------------------------------

Name        : ntp
Product     : Fedora 23
Version     : 4.2.6p5
Release     : 34.fc23
URL         : http://www.ntp.org
Summary     : The NTP daemon and utilities
Description :
The Network Time Protocol (NTP) is used to synchronize a computer's
time with another reference time source. This package includes ntpd
(a daemon which continuously adjusts system time) and utilities used
to query and configure the ntpd daemon.

Perl scripts ntp-wait and ntptrace are in the ntp-perl package,
ntpdate is in the ntpdate package and sntp is in the sntp package.
The documentation is in the ntp-doc package.

--------------------------------------------------------------------------------
Update Information:

Security fix for CVE-2015-7704, CVE-2015-5300, CVE-2015-7692, CVE-2015-7871,
CVE-2015-7702, CVE-2015-7691, CVE-2015-7852, CVE-2015-7701
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1274254 - CVE-2015-7691 CVE-2015-7692 CVE-2015-7702 ntp: incomplete checks in ntp_crypto.c
        https://bugzilla.redhat.com/show_bug.cgi?id=1274254
  [ 2 ] Bug #1274255 - CVE-2015-7701 ntp: slow memory leak in CRYPTO_ASSOC
        https://bugzilla.redhat.com/show_bug.cgi?id=1274255
  [ 3 ] Bug #1274261 - CVE-2015-7852 ntp: ntpq atoascii memory corruption vulnerability
        https://bugzilla.redhat.com/show_bug.cgi?id=1274261
  [ 4 ] Bug #1274265 - CVE-2015-7871 ntp: crypto-NAK symmetric association authentication bypass vulnerability
        https://bugzilla.redhat.com/show_bug.cgi?id=1274265
  [ 5 ] Bug #1271070 - CVE-2015-7704 ntp: disabling synchronization via crafted KoD packet
        https://bugzilla.redhat.com/show_bug.cgi?id=1271070
  [ 6 ] Bug #1271076 - CVE-2015-5300 ntp: MITM attacker can force ntpd to make a step larger than the panic threshold
        https://bugzilla.redhat.com/show_bug.cgi?id=1271076
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program. Use
su -c 'yum update ntp' at the command line.
For more information, refer to "Managing Software with yum",
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list