Commit 01f5b5e5 authored by Michael Stone's avatar Michael Stone

ntp advisory

CVS version numbers

english/security/2001/dsa-045.wml: INITIAL -> 1.1
parent c13320b4
<define-tag pagetitle>DSA-045-2 ntpd</define-tag>
<define-tag report_date>2001-04-09</define-tag>
<define-tag packages>ntpd</define-tag>
<define-tag description>remote root exploit</define-tag>
<define-tag isvulnerable>yes</define-tag>
<define-tag fixed>yes</define-tag>
<define-tag moreinfo>Przemyslaw Frasunek &lt;venglin@FREEBSD.LUBLIN.PL&gt;
reported that ntp daemons such as that released with Debian GNU/Linux are
vulnerable to a buffer overflow that can lead to a remote root exploit. A
previous advisory (DSA-045-1) partially addressed this issue, but introduced a
potential denial of service attack. This has been corrected for Debian 2.2
(potato) in ntp version 4.0.99g-2potato2.</define-tag>
#use wml::debian::security
<h3>Debian 2.2 (potato)</h3>
<h4>Source:</h4>
<blockquote>
<fileurl "http://security.debian.org/debian-security/dists/stable/updates/main/source/ntp_4.0.99g-2potato2.diff.gz">
<fileurl "http://security.debian.org/debian-security/dists/stable/updates/main/source/ntp_4.0.99g-2potato2.dsc">
<fileurl "http://security.debian.org/debian-security/dists/stable/updates/main/source/ntp_4.0.99g.orig.tar.gz">
</blockquote>
<h4>Architecture-independent component:</h4>
<blockquote>
<fileurl "http://security.debian.org/debian-security/dists/stable/updates/main/binary-all/ntp-doc_4.0.99g-2potato2_all.deb">
<fileurl "http://security.debian.org/debian-security/dists/stable/updates/main/binary-all/xntp3_4.0.99g-2potato2_all.deb">
</blockquote>
<h4>alpha:</h4>
<blockquote>
<fileurl "http://security.debian.org/debian-security/dists/stable/updates/main/binary-alpha/ntp_4.0.99g-2potato2_alpha.deb">
<fileurl "http://security.debian.org/debian-security/dists/stable/updates/main/binary-alpha/ntpdate_4.0.99g-2potato2_alpha.deb">
</blockquote>
<h4>arm:</h4>
<blockquote>
<fileurl "http://security.debian.org/debian-security/dists/stable/updates/main/binary-arm/ntp_4.0.99g-2potato2_arm.deb">
<fileurl "http://security.debian.org/debian-security/dists/stable/updates/main/binary-arm/ntpdate_4.0.99g-2potato2_arm.deb">
</blockquote>
<h4>i386:</h4>
<blockquote>
<fileurl "http://security.debian.org/debian-security/dists/stable/updates/main/binary-i386/ntp_4.0.99g-2potato2_i386.deb">
<fileurl "http://security.debian.org/debian-security/dists/stable/updates/main/binary-i386/ntpdate_4.0.99g-2potato2_i386.deb">
</blockquote>
<h4>m68k:</h4>
<blockquote>
<fileurl "http://security.debian.org/debian-security/dists/stable/updates/main/binary-m68k/ntp_4.0.99g-2potato2_m68k.deb">
<fileurl "http://security.debian.org/debian-security/dists/stable/updates/main/binary-m68k/ntpdate_4.0.99g-2potato2_m68k.deb">
</blockquote>
<h4>powerpc:</h4>
<blockquote>
<fileurl "http://security.debian.org/debian-security/dists/stable/updates/main/binary-powerpc/ntp_4.0.99g-2potato2_powerpc.deb">
<fileurl "http://security.debian.org/debian-security/dists/stable/updates/main/binary-powerpc/ntpdate_4.0.99g-2potato2_powerpc.deb">
</blockquote>
<h4>sparc:</h4>
<blockquote>
<fileurl "http://security.debian.org/debian-security/dists/stable/updates/main/binary-sparc/ntp_4.0.99g-2potato2_sparc.deb">
<fileurl "http://security.debian.org/debian-security/dists/stable/updates/main/binary-sparc/ntpdate_4.0.99g-2potato2_sparc.deb">
</blockquote>
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment