This bug was fixed in the package ntp - 1:4.2.8p4+dfsg-3ubuntu6
---------------
ntp (1:4.2.8p4+dfsg-3ubuntu6) yakkety; urgency=medium
* SECURITY UPDATE: Deja Vu replay attack on authenticated broadcast mode
- debian/patches/CVE-2015-7973.patch: improve timestamp verification in
include/ntp.h, ntpd/ntp_proto.c.
- CVE-2015-7973
* SECURITY UPDATE: impersonation between authenticated peers
- debian/patches/CVE-2015-7974.patch: check key ID in ntpd/ntp_proto.c.
- CVE-2015-7974
* SECURITY UPDATE: ntpq buffer overflow
- debian/patches/CVE-2015-7975.patch: add length check to ntpq/ntpq.c.
- CVE-2015-7975
* SECURITY UPDATE: ntpq saveconfig command allows dangerous characters in
filenames
- debian/patches/CVE-2015-7976.patch: check filename in
ntpd/ntp_control.c.
- CVE-2015-7976
* SECURITY UPDATE: restrict list denial of service
- debian/patches/CVE-2015-7977-7978.patch: improve restrict list
processing in ntpd/ntp_request.c.
- CVE-2015-7977
- CVE-2015-7978
* SECURITY UPDATE: authenticated broadcast mode off-path denial of
service
- debian/patches/CVE-2015-7979.patch: add more checks to
ntpd/ntp_proto.c.
- CVE-2015-7979
- CVE-2016-1547
* SECURITY UPDATE: Zero Origin Timestamp Bypass
- debian/patches/CVE-2015-8138.patch: check p_org in ntpd/ntp_proto.c.
- CVE-2015-8138
* SECURITY UPDATE: potential infinite loop in ntpq
- debian/patches/CVE-2015-8158.patch: add time checks to ntpdc/ntpdc.c,
ntpq/ntpq.c.
- CVE-2015-8158
* SECURITY UPDATE: NTP statsdir cleanup cronjob insecure (LP: #1528050)
- debian/ntp.cron.daily: fix security issues, patch thanks to halfdog!
- CVE-2016-0727
* SECURITY UPDATE: time spoofing via interleaved symmetric mode
- debian/patches/CVE-20xx-xxxx.patch: check for bogus packets in
ntpd/ntp_proto.c.
- CVE-2016-1548
* SECURITY UPDATE: buffer comparison timing attacks
- debian/patches/CVE-2016-1550.patch: use CRYPTO_memcmp in
libntp/a_md5encrypt.c, sntp/crypto.c.
- CVE-2016-1550
* SECURITY UPDATE: DoS via duplicate IPs on unconfig directives
- debian/patches/CVE-2016-2516.patch: improve logic in
ntpd/ntp_request.c.
- CVE-2016-2516
* SECURITY UPDATE: denial of service via crafted addpeer
- debian/patches/CVE-2016-2518.patch: check mode value in
ntpd/ntp_request.c.
- CVE-2016-2518
-- Marc Deslauriers <[email protected]> Wed, 01 Jun 2016
08:38:07 -0400
** Changed in: ntp (Ubuntu)
Status: Triaged => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-7973
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-7974
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-7975
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-7976
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-7977
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-7978
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-7979
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-8138
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-8158
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-1547
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-1548
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-1550
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-2516
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-2518
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1528050
Title:
NTP statsdir cleanup cronjob insecure
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/1528050/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs