此内容没有您所选择的语言版本。
1.158. ntp
1.158.1.  RHSA-2009:1039: Important security update  复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
Important
						This update has already been released (prior to the GA of this release) as the security errata  RHSA-2009:1039 
					
				This update has been rated as having important security impact by the Red Hat Security Response Team.
			
				The Network Time Protocol (NTP) is used to synchronize a computer's time with a referenced time source.
			
				A buffer overflow flaw was discovered in the ntpd daemon's NTPv4 authentication code. If ntpd was configured to use public key cryptography for NTP packet authentication, a remote attacker could use this flaw to send a specially-crafted request packet that could crash ntpd. (CVE-2009-1252)
			
Note
					NTP authentication is not enabled by default.
				
				A buffer overflow flaw was found in the ntpq diagnostic command. A malicious, remote server could send a specially-crafted reply to an ntpq request that could crash ntpq. (CVE-2009-0159)
			
				All ntp users are advised to upgrade to this updated package, which contains backported patches to resolve these issues. After installing the update, the ntpd daemon will be restarted automatically.
			
1.158.2.  RHSA-2009:0046: Moderate security update  复制链接链接已复制到粘贴板!
复制链接链接已复制到粘贴板!
Important
						This update has already been released (prior to the GA of this release) as the security errata  RHSA-2009:0046 
					
				This update has been rated as having moderate security impact by the Red Hat Security Response Team.
			
				The Network Time Protocol (NTP) is used to synchronize a computer's time with a referenced time source.
			
				A flaw was discovered in the way the ntpd daemon checked the return value of the OpenSSL EVP_VerifyFinal function. On systems using NTPv4 authentication, this could lead to an incorrect verification of cryptographic signatures, allowing time-spoofing attacks. (CVE-2009-0021)
			
Note
					This issue only affects systems that have enabled NTP authentication. By default, NTP authentication is not enabled.
				
				All ntp users are advised to upgrade to the updated packages, which contain a backported patch to resolve this issue. After installing the update, the ntpd daemon will restart automatically.