First published: Tue Aug 18 2015(Updated: )
It was found that ntpd exits with a segmentation fault when a statistics type that was not enabled during compilation (e.g. timingstats) is referenced by the statistics or filegen configuration command, for example: ntpq -c ':config statistics timingstats' ntpq -c ':config filegen timingstats' Upstream patch: <a href="http://bk.ntp.org/ntp-dev/?PAGE=patch&REV=4d253ed0A400LyhRQIV0u23NJwuGAA">http://bk.ntp.org/ntp-dev/?PAGE=patch&REV=4d253ed0A400LyhRQIV0u23NJwuGAA</a> (in 4.2.6, the code than handles NULL == filegen needs to be adjusted as the outer loop was changed from while to for)
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora | =21 | |
Fedora | =22 | |
Fedora | =23 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =6.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Debian | =7.0 | |
Debian | =8.0 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =15.04 | |
Ubuntu Linux | =15.10 | |
NTP | <=4.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5195 has been classified as a moderate severity vulnerability due to the potential for denial of service through segmentation faults.
To fix CVE-2015-5195, update your NTP software to a version that addresses this segmentation fault issue.
CVE-2015-5195 affects several versions of NTP across Fedora, Red Hat Enterprise Linux, Debian, and Ubuntu distributions.
The vulnerability is caused by NTP exiting with a segmentation fault when referencing a statistics type that was not enabled during compilation.
There is currently no evidence that CVE-2015-5195 is being actively exploited in the wild.