Author: kroeckx Date: 2016-05-14 13:24:47 +0000 (Sat, 14 May 2016) New Revision: 41718
Modified: data/CVE/list Log: Add descriptions for ntp issues. Modified: data/CVE/list =================================================================== --- data/CVE/list 2016-05-14 10:55:15 UTC (rev 41717) +++ data/CVE/list 2016-05-14 13:24:47 UTC (rev 41718) @@ -6250,23 +6250,23 @@ NOTE: Fixed versions: 2.0.2, 1.12.10 CVE-2016-2520 RESERVED -CVE-2016-2519 +CVE-2016-2519 (ctl_getitem() return value not always checked) RESERVED - ntp 1:4.2.8p7+dfsg-1 NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security TODO: check -CVE-2016-2518 +CVE-2016-2518 (Crafted addpeer with hmode > 7 causes out-of-bounds reference) RESERVED - ntp 1:4.2.8p7+dfsg-1 NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security TODO: check -CVE-2016-2517 +CVE-2016-2517 (Remote configuration trustedkey/requestkey/controlkey values are not properly validated) RESERVED - ntp 1:4.2.8p7+dfsg-1 NOTE: CVE-2016-2517 is for a regression caused by the patch for CVE-2016-2516 NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security TODO: check -CVE-2016-2516 +CVE-2016-2516 (Duplicate IPs on unconfig directives will cause an assertion failure) RESERVED - ntp 1:4.2.8p7+dfsg-1 NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security @@ -9692,27 +9692,27 @@ NOTE: https://github.com/facebook/hhvm/commit/979b5b312ffbd56126c52f3dcb6cf8fcab89664f NOTE: https://github.com/facebook/hhvm/commit/604689e1565ea6361f9d81f839cd56bdda3b45ed NOTE: https://github.com/facebook/hhvm/commit/f21dccdde582c61d5a9b52dd821bcb1f08169d28 -CVE-2016-1551 +CVE-2016-1551 (Refclock packets can come from the network) RESERVED - ntp 1:4.2.8p7+dfsg-1 NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security TODO: check -CVE-2016-1550 +CVE-2016-1550 (Timing attack for authenticated packets) RESERVED - ntp 1:4.2.8p7+dfsg-1 NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security TODO: check -CVE-2016-1549 +CVE-2016-1549 (Sybil attack with trustedkey) RESERVED - ntp 1:4.2.8p7+dfsg-1 NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security TODO: check -CVE-2016-1548 +CVE-2016-1548 (Change the time of an ntpd client or deny service to an ntpd client by forcing it to change from basic client/server mode to interleaved symmetric mode.) RESERVED - ntp 1:4.2.8p7+dfsg-1 NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security TODO: check -CVE-2016-1547 +CVE-2016-1547 (Validate crypto-NAKs) RESERVED - ntp 1:4.2.8p7+dfsg-1 NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security @@ -17041,7 +17041,7 @@ [wheezy] - gvfs <no-dsa> (Minor issue) [jessie] - gvfs <no-dsa> (Minor issue) NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/10/06/3 -CVE-2015-7705 +CVE-2015-7705 (An attacker can forge packets that claim to be from the target and send them to servers often enough that a server that implements KoD rate limiting will send the target machine a KoD response to attempt to reduce the rate of incoming packets) RESERVED - ntp <unfixed> [squeeze] - ntp <no-dsa> (Default config not affected) @@ -17050,7 +17050,7 @@ NOTE: http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_Security_Vulner NOTE: https://github.com/ntp-project/ntp/commit/21d57dc336dbe9a975baca5ce5ae4da5b71ff123 NOTE: https://github.com/ntp-project/ntp/commit/492758c3d0690d3ccf7130fabfcf670997f12f7b -CVE-2015-7704 +CVE-2015-7704 (An ntpd client that honors Kiss-of-Death responses will honor KoD messages that have been forged by an attacker, causing it to delay or stop querying its servers for time updates.) RESERVED {DSA-3388-1 DLA-335-1} - ntp 1:4.2.8p4+dfsg-3 _______________________________________________ Secure-testing-commits mailing list Secure-testing-commits@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits