[Secure-testing-commits] r49965 - data/CVE
Moritz Muehlenhoff
jmm at moszumanska.debian.org
Thu Mar 23 13:45:34 UTC 2017
Author: jmm
Date: 2017-03-23 13:45:34 +0000 (Thu, 23 Mar 2017)
New Revision: 49965
Modified:
data/CVE/list
Log:
ntp fixed
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2017-03-23 12:54:20 UTC (rev 49964)
+++ data/CVE/list 2017-03-23 13:45:34 UTC (rev 49965)
@@ -1822,22 +1822,22 @@
NOT-FOR-US: FTPShell Client
CVE-2017-6464 [Denial of Service via Malformed Config]
RESERVED
- - ntp <unfixed>
+ - ntp 1:4.2.8p10+dfsg-1
NOTE: http://support.ntp.org/bin/view/Main/NtpBug3389
CVE-2017-6463 [Authenticated DoS via Malicious Config Option]
RESERVED
- - ntp <unfixed>
+ - ntp 1:4.2.8p10+dfsg-1
NOTE: http://support.ntp.org/bin/view/Main/NtpBug3387
CVE-2017-6462 [Buffer Overflow in DPTS Clock]
RESERVED
- - ntp <unfixed>
+ - ntp 1:4.2.8p10+dfsg-1
[wheezy] - ntp <no-dsa> (Minor issue)
NOTE: http://support.ntp.org/bin/view/Main/NtpBug3388
CVE-2017-6461
REJECTED
CVE-2017-6460 [Buffer Overflow in ntpq when fetching reslist]
RESERVED
- - ntp <unfixed>
+ - ntp 1:4.2.8p10+dfsg-1
NOTE: http://support.ntp.org/bin/view/Main/NtpBug3377
CVE-2017-6459 [Windows Installer: Data Structure terminated insufficiently]
RESERVED
@@ -1845,7 +1845,7 @@
NOTE: http://support.ntp.org/bin/view/Main/NtpBug3382
CVE-2017-6458 [Potential Overflows in ctl_put() functions]
RESERVED
- - ntp <unfixed>
+ - ntp 1:4.2.8p10+dfsg-1
[wheezy] - ntp <no-dsa> (Minor issue)
NOTE: http://support.ntp.org/bin/view/Main/NtpBug3379
NOTE: The vulnerability can only be triggered by adding very long
@@ -20144,7 +20144,7 @@
RESERVED
CVE-2016-9042
RESERVED
- - ntp <unfixed>
+ - ntp 1:4.2.8p10+dfsg-1
NOTE: http://support.ntp.org/bin/view/Main/NtpBug3361
CVE-2016-9041
REJECTED
More information about the Secure-testing-commits
mailing list