Author: jmm Date: 2017-03-23 13:45:34 +0000 (Thu, 23 Mar 2017) New Revision: 49965
Modified: data/CVE/list Log: ntp fixed Modified: data/CVE/list =================================================================== --- data/CVE/list 2017-03-23 12:54:20 UTC (rev 49964) +++ data/CVE/list 2017-03-23 13:45:34 UTC (rev 49965) @@ -1822,22 +1822,22 @@ NOT-FOR-US: FTPShell Client CVE-2017-6464 [Denial of Service via Malformed Config] RESERVED - - ntp <unfixed> + - ntp 1:4.2.8p10+dfsg-1 NOTE: http://support.ntp.org/bin/view/Main/NtpBug3389 CVE-2017-6463 [Authenticated DoS via Malicious Config Option] RESERVED - - ntp <unfixed> + - ntp 1:4.2.8p10+dfsg-1 NOTE: http://support.ntp.org/bin/view/Main/NtpBug3387 CVE-2017-6462 [Buffer Overflow in DPTS Clock] RESERVED - - ntp <unfixed> + - ntp 1:4.2.8p10+dfsg-1 [wheezy] - ntp <no-dsa> (Minor issue) NOTE: http://support.ntp.org/bin/view/Main/NtpBug3388 CVE-2017-6461 REJECTED CVE-2017-6460 [Buffer Overflow in ntpq when fetching reslist] RESERVED - - ntp <unfixed> + - ntp 1:4.2.8p10+dfsg-1 NOTE: http://support.ntp.org/bin/view/Main/NtpBug3377 CVE-2017-6459 [Windows Installer: Data Structure terminated insufficiently] RESERVED @@ -1845,7 +1845,7 @@ NOTE: http://support.ntp.org/bin/view/Main/NtpBug3382 CVE-2017-6458 [Potential Overflows in ctl_put() functions] RESERVED - - ntp <unfixed> + - ntp 1:4.2.8p10+dfsg-1 [wheezy] - ntp <no-dsa> (Minor issue) NOTE: http://support.ntp.org/bin/view/Main/NtpBug3379 NOTE: The vulnerability can only be triggered by adding very long @@ -20144,7 +20144,7 @@ RESERVED CVE-2016-9042 RESERVED - - ntp <unfixed> + - ntp 1:4.2.8p10+dfsg-1 NOTE: http://support.ntp.org/bin/view/Main/NtpBug3361 CVE-2016-9041 REJECTED _______________________________________________ Secure-testing-commits mailing list Secure-testing-commits@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits