Updated openntpd/busybox packages fix security vulnerability
Publication date: 09 Aug 2016Modification date: 09 Aug 2016
Type: security
Affected Mageia releases : 5
CVE: CVE-2016-6301
Description
The busybox NTP implementation doesn't check the NTP mode of packets received on the server port and responds to any packet with the right size. This includes responses from another NTP server. An attacker can send a packet with a spoofed source address in order to create an infinite loop of responses between two busybox NTP servers. Adding more packets to the loop increases the traffic between the servers until one of them has a fully loaded CPU and/or network (CVE-2016-6301). The affected code originated from openntpd, which had fixed it upstream, but the fix had not made it into Mageia's openntpd package. It has also been patched with the fix in this update.
References
SRPMS
5/core
- openntpd-3.9p1-11.1.mga5
- busybox-1.22.1-5.3.mga5