Fixed vulnerabilities:
- CVE-2014-9297 (VulnLIB link) Stephen Roettger, Sebastian Krahmer, and Harlan Stenn discovered that NTP incorrectly handled the length value in extension fields. A remote attacker could use this issue to possibly obtain leaked information, or cause the NTP daemon to crash, resulting in a denial of service.
- CVE-2014-9298 (VulnLIB link) Stephen Roettger discovered that NTP incorrectly handled ACLs based on certain IPv6 addresses.
Affected releases:
- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Software description:
- ntp - Network Time Protocol daemon and utility programs
Solution:
- Check VulnLIB for fixes for CVEs listed above.
Source:
Tuesday, 10.02.2015