First published: Tue Aug 18 2015(Updated: )
It was found that ntpd could crash due to an uninitialized variable when processing malformed logconfig configuration commands, for example: ntpq -c ":config logconfig a" Upstream patch: <a href="http://bk.ntp.org/ntp-dev/?PAGE=patch&REV=4c4fc141LwvcoGp-lLGhkAFp3ZvtrA">http://bk.ntp.org/ntp-dev/?PAGE=patch&REV=4c4fc141LwvcoGp-lLGhkAFp3ZvtrA</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Fedora | =21 | |
Red Hat Fedora | =22 | |
SUSE Linux Enterprise Debuginfo | =11-sp2 | |
SUSE Linux Enterprise Debuginfo | =11-sp3 | |
SUSE Linux Enterprise Server | =10-sp4 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Server | =11-sp3 | |
SUSE Manager Server | =2.1 | |
SUSE Manager Proxy | =2.1 | |
openSUSE OpenStack Cloud | =5 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =6.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Debian Linux | =7.0 | |
Debian Linux | =8.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =15.04 | |
Ubuntu | =15.10 | |
NTP | <=4.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5194 has been classified as a moderate severity vulnerability.
To fix CVE-2015-5194, ensure you apply the patches provided by your operating system vendor.
ntpd versions prior to 4.2.8 are vulnerable to CVE-2015-5194.
CVE-2015-5194 affects various systems including Fedora, SUSE, Red Hat, and Debian distributions.
Yes, CVE-2015-5194 can lead to crashes of ntpd when processing malformed logconfig commands.