Source: ntp
Version: 1:4.2.6.p2+dfsg-1
Severity: grave
Tags: security upstream fixed-upstream

Hi,

the following vulnerabilities were published for ntp.

CVE-2014-9293[0]:
automatic generation of weak default key in config_auth()

CVE-2014-9294[1]:
ntp-keygen uses weak random number generator and seed when generating MD5 keys

CVE-2014-9295[2]:
Multiple buffer overflows via specially-crafted packets

CVE-2014-9296[3]:
receive() missing return on error

The corresponding Red Hat bugzilla entries contain as well some more
informations.

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2014-9293
[1] https://security-tracker.debian.org/tracker/CVE-2014-9294
[2] https://security-tracker.debian.org/tracker/CVE-2014-9295
[3] https://security-tracker.debian.org/tracker/CVE-2014-9296

Regards,
Salvatore


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to