==========================================================================
Ubuntu Security Notice USN-2567-1
April 13, 2015
ntp vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 14.10
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in NTP.
Software Description:
– ntp: Network Time Protocol daemon and utility programs
Details:
Miroslav Lichvar discovered that NTP incorrectly validated MAC fields. A
remote attacker could possibly use this issue to bypass authentication and
spoof packets. (CVE-2015-1798)
Miroslav Lichvar discovered that NTP incorrectly handled certain invalid
packets. A remote attacker could possibly use this issue to cause a denial
of service. (CVE-2015-1799)
Juergen Perlinger discovered that NTP incorrectly generated MD5 keys on
big-endian platforms. This issue could either cause ntp-keygen to hang, or
could result in non-random keys. (CVE number pending)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.10:
ntp 1:4.2.6.p5+dfsg-3ubuntu2.14.10.3
Ubuntu 14.04 LTS:
ntp 1:4.2.6.p5+dfsg-3ubuntu2.14.04.3
Ubuntu 12.04 LTS:
ntp 1:4.2.6.p3+dfsg-1ubuntu3.4
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2567-1
CVE-2015-1798, CVE-2015-1799
Package Information:
https://launchpad.net/ubuntu/+source/ntp/1:4.2.6.p5+dfsg-3ubuntu2.14.10.3
https://launchpad.net/ubuntu/+source/ntp/1:4.2.6.p5+dfsg-3ubuntu2.14.04.3
https://launchpad.net/ubuntu/+source/ntp/1:4.2.6.p3+dfsg-1ubuntu3.4
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=dR7a
—–END PGP SIGNATURE—–
—