Lucene search

K
suseSuseSUSE-SU-2015:0259-3
HistoryFeb 16, 2015 - 7:05 p.m.

Security update for ntp (important)

2015-02-1619:05:42
lists.opensuse.org
24

0.044 Low

EPSS

Percentile

91.6%

ntp has been updated to fix four security issues:

   * CVE-2014-9294: ntp-keygen used a weak RNG seed, which made it easier
     for remote attackers to defeat cryptographic protection mechanisms
     via a brute-force attack. (bsc#910764)
   * CVE-2014-9293: The config_auth function, when an auth key is not
     configured, improperly generated a key, which made it easier for
     remote attackers to defeat cryptographic protection mechanisms via a
     brute-force attack. (bsc#910764)
   * CVE-2014-9298: ::1 can be spoofed on some operating systems, so ACLs
     based on IPv6 ::1 addresses could be bypassed. (bsc#910764)
   * CVE-2014-9297: vallen is not validated in several places in
     ntp_crypto.c, leading to potential information leak. (bsc#910764)

Security Issues:

   * CVE-2014-9294
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9294">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9294</a>&gt;
   * CVE-2014-9293
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9293">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9293</a>&gt;
   * CVE-2014-9298
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9298">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9298</a>&gt;
   * CVE-2014-9297
     &lt;<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9297">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9297</a>&gt;

0.044 Low

EPSS

Percentile

91.6%

Related for SUSE-SU-2015:0259-3