Slackware Security Announcement 2009-343-01: ntp

Article Source Slackware Security Announcements

New ntp packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2,

11.0, 12.0, 12.1, 12.2, 13.0, and -current to fix a security issue. If a

spoofed mode 7 packet is sent to a vulnerable NTP daemon it may cause CPU

and/or disk space exhaustion, resulting in a denial of service.

More details about this issue may be found in the Common

Vulnerabilities and Exposures (CVE) database:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3563

Here are the details from the Slackware 13.0 ChangeLog:

+————————–+

patches/packages/ntp-4.2.4p8-i486-1_slack13.0.txz: Upgraded.

Prevent a denial-of-service attack involving spoofed mode 7 packets.

For more information, see:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3563

(* Security fix *)

+————————–+

Where to find the new packages:

+—————————–+

HINT: Getting slow download speeds from ftp.slackware.com?

Give slackware.osuosl.org a try. This is another primary FTP site

for Slackware that can be considerably faster than downloading

directly from ftp.slackware.com.

Thanks to the friendly folks at the OSU Open Source Lab

(http://osuosl.org) for donating additional FTP and rsync hosting

to the Slackware project! 🙂

Also see the “Get Slack” section on http://slackware.com for

additional mirror sites near you.

Updated package for Slackware 8.1:

ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/ntp-4.2.2p3-i386-2_slack8.1.tgz

Updated package for Slackware 9.0:

ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/ntp-4.2.2p3-i386-2_slack9.0.tgz

Updated package for Slackware 9.1:

ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/ntp-4.2.2p3-i486-2_slack9.1.tgz

Updated package for Slackware 10.0:

ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/ntp-4.2.2p3-i486-2_slack10.0.tgz

Updated package for Slackware 10.1:

ftp://ftp.slackware.com/pub/slackware/slackware-10.1/patches/packages/ntp-4.2.2p3-i486-2_slack10.1.tgz

Updated package for Slackware 10.2:

ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/ntp-4.2.2p3-i486-2_slack10.2.tgz

Updated package for Slackware 11.0:

ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/ntp-4.2.2p3-i486-3_slack11.0.tgz

Updated package for Slackware 12.0:

ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/ntp-4.2.4p8-i486-1_slack12.0.tgz

Updated package for Slackware 12.1:

ftp://ftp.slackware.com/pub/slackware/slackware-12.1/patches/packages/ntp-4.2.4p8-i486-1_slack12.1.tgz

Updated package for Slackware 12.2:

ftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/ntp-4.2.4p8-i486-1_slack12.2.tgz

Updated package for Slackware 13.0:

ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/ntp-4.2.4p8-i486-1_slack13.0.txz

Updated package for Slackware x86_64 13.0:

ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/ntp-4.2.4p8-x86_64-1_slack13.0.txz

Updated package for Slackware -current:

ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/ntp-4.2.4p8-i486-1.txz

Updated package for Slackware x86_64 -current:

ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/ntp-4.2.4p8-x86_64-1.txz

MD5 signatures:

+————-+

Slackware 8.1 package:

cf159af385eff1f3e7ee97dd31181a50 ntp-4.2.2p3-i386-2_slack8.1.tgz

Slackware 9.0 package:

281891ce933cc51b4da7c4856c2e9a7a ntp-4.2.2p3-i386-2_slack9.0.tgz

Slackware 9.1 package:

8ba51d005758c1d42db139730e9552ab ntp-4.2.2p3-i486-2_slack9.1.tgz

Slackware 10.0 package:

d4494f109da2f947515bf8ca40db2e6b ntp-4.2.2p3-i486-2_slack10.0.tgz

Slackware 10.1 package:

3ed65c1bda71156978424de0f13436f9 ntp-4.2.2p3-i486-2_slack10.1.tgz

Slackware 10.2 package:

345eced7dc1135943f119c8ae066fbde ntp-4.2.2p3-i486-2_slack10.2.tgz

Slackware 11.0 package:

e5fbcad45bb274ebee2c6c11b0c18a73 ntp-4.2.2p3-i486-3_slack11.0.tgz

Slackware 12.0 package:

d367da8f356c71ee915957280fe731b2 ntp-4.2.4p8-i486-1_slack12.0.tgz

Slackware 12.1 package:

3632138b29c2f73f027be03b220da30c ntp-4.2.4p8-i486-1_slack12.1.tgz

Slackware 12.2 package:

450f8b3cdf63cc61ea6d2baa9c9ebb00 ntp-4.2.4p8-i486-1_slack12.2.tgz

Slackware 13.0 package:

af0c7662fb258ffd6f34f4ca68ee6553 ntp-4.2.4p8-i486-1_slack13.0.txz

Slackware x86_64 13.0 package:

77dfe4dfe7f35e02e9cd455b0d82e79f ntp-4.2.4p8-x86_64-1_slack13.0.txz

Slackware -current package:

22f81c7c0856aa55846323f9376dbdbf ntp-4.2.4p8-i486-1.txz

Slackware x86_64 -current package:

1d6562a98631f5f8601f696a7b4d7ed7 ntp-4.2.4p8-x86_64-1.txz

Installation instructions:

+————————+

Upgrade the package as root:

# upgradepkg ntp-4.2.4p8-i486-1_slack13.0.txz

Then, restart ntpd.

+—–+

Slackware Linux Security Team

http://slackware.com/gpg-key

This e-mail address is being protected from spambots. You need JavaScript enabled to view it

Article Source Slackware Security Announcements New ntp packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 12.0, 12.1, 12.2, 13.0, and -current to fix a security issue. If a spoofed mode 7 packet is sent to a vulnerable NTP daemon it may cause CPU and/or disk space exhaustion,…

Article Source Slackware Security Announcements New ntp packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 12.0, 12.1, 12.2, 13.0, and -current to fix a security issue. If a spoofed mode 7 packet is sent to a vulnerable NTP daemon it may cause CPU and/or disk space exhaustion,…

Leave a Reply

Your email address will not be published. Required fields are marked *