[SECURITY] Fedora 21 Update: ntp-4.2.6p5-30.fc21

updates at fedoraproject.org updates at fedoraproject.org
Tue Apr 28 13:01:04 UTC 2015

Fedora Update Notification
2015-04-09 04:57:43

Name        : ntp
Product     : Fedora 21
Version     : 4.2.6p5
Release     : 30.fc21
URL         : http://www.ntp.org
Summary     : The NTP daemon and utilities
Description :
The Network Time Protocol (NTP) is used to synchronize a computer's
time with another reference time source. This package includes ntpd
(a daemon which continuously adjusts system time) and utilities used
to query and configure the ntpd daemon.

Perl scripts ntp-wait and ntptrace are in the ntp-perl package,
ntpdate is in the ntpdate package and sntp is in the sntp package.
The documentation is in the ntp-doc package.

Update Information:

Security fix for CVE-2015-1799, CVE-2015-1798, #1210324

* Tue Apr 14 2015 Miroslav Lichvar <mlichvar at redhat.com> 4.2.6p5-30
- fix generation of MD5 keys with ntp-keygen on big-endian systems (#1210324)
* Wed Apr  8 2015 Miroslav Lichvar <mlichvar at redhat.com> 4.2.6p5-29
- reject packets without MAC when authentication is enabled (CVE-2015-1798)
- protect symmetric associations with symmetric key against DoS attack
* Thu Feb 26 2015 Miroslav Lichvar <mlichvar at redhat.com> 4.2.6p5-28
- don't step clock for leap second with -x option (#1196635)
- allow creating all SHM segments with owner-only access
- allow symmetric keys up to 32 bytes again
- use larger RSA exponent in ntp-keygen
- fix crash in ntpq mreadvar command
- don't drop packets with source port below 123
- increase memlock limit again
- fix typos in ntpd man page
- improve documentation of restrict command
* Thu Feb  5 2015 Miroslav Lichvar <mlichvar at redhat.com> 4.2.6p5-27
- validate lengths of values in extension fields (CVE-2014-9297)
- drop packets with spoofed source address ::1 (CVE-2014-9298)
* Thu Jan 29 2015 Miroslav Lichvar <mlichvar at redhat.com> 4.2.6p5-26
- require timedatex (#1136905)
* Fri Dec 19 2014 Miroslav Lichvar <mlichvar at redhat.com> 4.2.6p5-25
- don't generate weak control key for resolver (CVE-2014-9293)
- don't generate weak MD5 keys in ntp-keygen (CVE-2014-9294)
- fix buffer overflows via specially-crafted packets (CVE-2014-9295)
- don't mobilize passive association when authentication fails (CVE-2014-9296)
* Tue Nov  4 2014 Miroslav Lichvar <mlichvar at redhat.com> 4.2.6p5-24
- use network-online target in ntpdate and sntp services (#1116474)
- move sntp kod database to allow SELinux labeling

  [ 1 ] Bug #1199435 - CVE-2015-1799 ntp: authentication doesn't protect symmetric associations against DoS attacks
  [ 2 ] Bug #1199430 - CVE-2015-1798 ntp: ntpd accepts unauthenticated packets with symmetric key crypto
  [ 3 ] Bug #1210324 - CVE-2015-3405 ntp: ntp-keygen may generate non-random symmetric keys on big-endian systems

This update can be installed with the "yum" update program.  Use
su -c 'yum update ntp' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at

More information about the package-announce mailing list