Lucene search

K
debianDebianDEBIAN:DSA-5466-1:79252
HistoryAug 04, 2023 - 5:15 a.m.

[SECURITY] [DSA 5466-1] ntpsec security update

2023-08-0405:15:04
lists.debian.org
7
nts
debian
ntpd crash
cve-2023-4012
bookworm
security update
debian bug
ntpsec

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.0005 Low

EPSS

Percentile

17.1%


Debian Security Advisory DSA-5466-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
August 04, 2023 https://www.debian.org/security/faq


Package : ntpsec
CVE ID : CVE-2023-4012
Debian Bug : 1038422

It was discovered that ntpd in ntpsec, a secure, hardened, and improved
implementation derived from the original NTP project, could crash if NTS
is disabled and an NTS-enabled client request (mode 3) is received.

For the stable distribution (bookworm), this problem has been fixed in
version 1.2.2+dfsg1-1+deb12u1.

We recommend that you upgrade your ntpsec packages.

For the detailed security status of ntpsec please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/ntpsec

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.0005 Low

EPSS

Percentile

17.1%