Slackware Security Announcement 2009-343-01: ntp
-
by cobra_admin
- 29
Article Source Slackware Security Announcements
New ntp packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2,
11.0, 12.0, 12.1, 12.2, 13.0, and -current to fix a security issue. If a
spoofed mode 7 packet is sent to a vulnerable NTP daemon it may cause CPU
and/or disk space exhaustion, resulting in a denial of service.
More details about this issue may be found in the Common
Vulnerabilities and Exposures (CVE) database:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3563
Here are the details from the Slackware 13.0 ChangeLog:
+————————–+
patches/packages/ntp-4.2.4p8-i486-1_slack13.0.txz: Upgraded.
Prevent a denial-of-service attack involving spoofed mode 7 packets.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3563
(* Security fix *)
+————————–+
Where to find the new packages:
+—————————–+
HINT: Getting slow download speeds from ftp.slackware.com?
Give slackware.osuosl.org a try. This is another primary FTP site
for Slackware that can be considerably faster than downloading
directly from ftp.slackware.com.
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating additional FTP and rsync hosting
to the Slackware project!
Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/ntp-4.2.2p3-i386-2_slack8.1.tgz
Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/ntp-4.2.2p3-i386-2_slack9.0.tgz
Updated package for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/ntp-4.2.2p3-i486-2_slack9.1.tgz
Updated package for Slackware 10.0:
ftp://ftp.slackware.com/pub/slackware/slackware-10.0/patches/packages/ntp-4.2.2p3-i486-2_slack10.0.tgz
Updated package for Slackware 10.1:
ftp://ftp.slackware.com/pub/slackware/slackware-10.1/patches/packages/ntp-4.2.2p3-i486-2_slack10.1.tgz
Updated package for Slackware 10.2:
ftp://ftp.slackware.com/pub/slackware/slackware-10.2/patches/packages/ntp-4.2.2p3-i486-2_slack10.2.tgz
Updated package for Slackware 11.0:
ftp://ftp.slackware.com/pub/slackware/slackware-11.0/patches/packages/ntp-4.2.2p3-i486-3_slack11.0.tgz
Updated package for Slackware 12.0:
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/ntp-4.2.4p8-i486-1_slack12.0.tgz
Updated package for Slackware 12.1:
ftp://ftp.slackware.com/pub/slackware/slackware-12.1/patches/packages/ntp-4.2.4p8-i486-1_slack12.1.tgz
Updated package for Slackware 12.2:
ftp://ftp.slackware.com/pub/slackware/slackware-12.2/patches/packages/ntp-4.2.4p8-i486-1_slack12.2.tgz
Updated package for Slackware 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/ntp-4.2.4p8-i486-1_slack13.0.txz
Updated package for Slackware x86_64 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/ntp-4.2.4p8-x86_64-1_slack13.0.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/ntp-4.2.4p8-i486-1.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/ntp-4.2.4p8-x86_64-1.txz
MD5 signatures:
+————-+
Slackware 8.1 package:
cf159af385eff1f3e7ee97dd31181a50 ntp-4.2.2p3-i386-2_slack8.1.tgz
Slackware 9.0 package:
281891ce933cc51b4da7c4856c2e9a7a ntp-4.2.2p3-i386-2_slack9.0.tgz
Slackware 9.1 package:
8ba51d005758c1d42db139730e9552ab ntp-4.2.2p3-i486-2_slack9.1.tgz
Slackware 10.0 package:
d4494f109da2f947515bf8ca40db2e6b ntp-4.2.2p3-i486-2_slack10.0.tgz
Slackware 10.1 package:
3ed65c1bda71156978424de0f13436f9 ntp-4.2.2p3-i486-2_slack10.1.tgz
Slackware 10.2 package:
345eced7dc1135943f119c8ae066fbde ntp-4.2.2p3-i486-2_slack10.2.tgz
Slackware 11.0 package:
e5fbcad45bb274ebee2c6c11b0c18a73 ntp-4.2.2p3-i486-3_slack11.0.tgz
Slackware 12.0 package:
d367da8f356c71ee915957280fe731b2 ntp-4.2.4p8-i486-1_slack12.0.tgz
Slackware 12.1 package:
3632138b29c2f73f027be03b220da30c ntp-4.2.4p8-i486-1_slack12.1.tgz
Slackware 12.2 package:
450f8b3cdf63cc61ea6d2baa9c9ebb00 ntp-4.2.4p8-i486-1_slack12.2.tgz
Slackware 13.0 package:
af0c7662fb258ffd6f34f4ca68ee6553 ntp-4.2.4p8-i486-1_slack13.0.txz
Slackware x86_64 13.0 package:
77dfe4dfe7f35e02e9cd455b0d82e79f ntp-4.2.4p8-x86_64-1_slack13.0.txz
Slackware -current package:
22f81c7c0856aa55846323f9376dbdbf ntp-4.2.4p8-i486-1.txz
Slackware x86_64 -current package:
1d6562a98631f5f8601f696a7b4d7ed7 ntp-4.2.4p8-x86_64-1.txz
Installation instructions:
+————————+
Upgrade the package as root:
# upgradepkg ntp-4.2.4p8-i486-1_slack13.0.txz
Then, restart ntpd.
+—–+
Slackware Linux Security Team
http://slackware.com/gpg-key
This e-mail address is being protected from spambots. You need JavaScript enabled to view it
Article Source Slackware Security Announcements New ntp packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 12.0, 12.1, 12.2, 13.0, and -current to fix a security issue. If a spoofed mode 7 packet is sent to a vulnerable NTP daemon it may cause CPU and/or disk space exhaustion,…
Article Source Slackware Security Announcements New ntp packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 12.0, 12.1, 12.2, 13.0, and -current to fix a security issue. If a spoofed mode 7 packet is sent to a vulnerable NTP daemon it may cause CPU and/or disk space exhaustion,…