MGASA-2020-0281

Source
https://advisories.mageia.org/MGASA-2020-0281.html
Import Source
https://advisories.mageia.org/MGASA-2020-0281.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2020-0281
Related
Published
2020-07-05T19:48:23Z
Modified
2020-07-05T19:16:46Z
Summary
Updated ntp packages fix security vulnerability
Details

Updated ntp packages fix security vulnerability:

ntpd in ntp 4.2.8 before 4.2.8p15 and 4.3.x before 4.3.101 allows remote attackers to cause a denial of service (memory consumption) by sending packets, because memory is not freed in situations where a CMAC key is used and associated with a CMAC algorithm in the ntp.keys file (CVE-2020-15025)

References
Credits

Affected packages

Mageia:7 / ntp

Package

Name
ntp
Purl
pkg:rpm/mageia/ntp?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.2.8p15-1.mga7

Ecosystem specific

{
    "section": "core"
}