MGASA-2015-0418

Source
https://advisories.mageia.org/MGASA-2015-0418.html
Import Source
https://advisories.mageia.org/MGASA-2015-0418.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2015-0418
Related
Published
2015-10-30T20:11:10Z
Modified
2015-10-30T20:04:10Z
Summary
Updated ntp package fixes security vulnerabilities
Details

Yves Younan discovered that NTP incorrectly handled logfile and keyfile directives. In a non-default configuration, a remote authenticated attacker could possibly use this issue to cause NTP to enter a loop, resulting in a denial of service (CVE-2015-7850).

Yves Younan discovered that NTP incorrectly handled reference clock memory. A malicious refclock could possibly use this issue to cause NTP to crash, resulting in a denial of service, or possibly execute arbitrary code (CVE-2015-7853).

John D "Doug" Birdwell discovered that NTP incorrectly handled decoding certain bogus values. An attacker could possibly use this issue to cause NTP to crash, resulting in a denial of service (CVE-2015-7855).

References
Credits

Affected packages

Mageia:5 / ntp

Package

Name
ntp
Purl
pkg:rpm/mageia/ntp?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.2.6p5-24.3.mga5

Ecosystem specific

{
    "section": "core"
}