MGASA-2018-0371

Source
https://advisories.mageia.org/MGASA-2018-0371.html
Import Source
https://advisories.mageia.org/MGASA-2018-0371.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2018-0371
Related
Published
2018-09-13T20:38:07Z
Modified
2018-09-13T20:05:07Z
Summary
Updated ntp packages fix security vulnerability
Details

Updated ntp packages fix security vulnerability:

Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter (CVE-2018-12327).

References
Credits

Affected packages

Mageia:6 / ntp

Package

Name
ntp
Purl
pkg:rpm/mageia/ntp?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.2.8p12-1.mga6

Ecosystem specific

{
    "section": "core"
}