Bug 1300267 - (CVE-2015-7975) CVE-2015-7975 ntp: nextvar() missing length check in ntpq
CVE-2015-7975 ntp: nextvar() missing length check in ntpq
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20160120,reported=2...
: Security
Depends On: 1300277
Blocks: 1297474
  Show dependency treegraph
 
Reported: 2016-01-20 06:41 EST by Martin Prpič
Modified: 2016-01-21 06:35 EST (History)
1 user (show)

See Also:
Fixed In Version: ntp 4.2.8p6
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-01-20 09:34:17 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Martin Prpič 2016-01-20 06:41:42 EST
It was found that ntpq did not implement a proper lenght check when calling nextvar(), which executes a memcpy(), on the name buffer.

A remote attacker could potentially use this flaw to crash an ntpq client instance.

Upstream patch:

https://github.com/ntp-project/ntp/commit/12f1323d18c8d74eb14fb5ac5574183d779794c5
Comment 2 Martin Prpič 2016-01-20 07:01:48 EST
Created ntp tracking bugs for this issue:

Affects: fedora-all [bug 1300277]
Comment 3 Martin Prpič 2016-01-20 09:34:17 EST
Statement:

This issue did not affect the versions of ntp as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they do not include the affected code, which was introduced in version 4.2.8 of NTP.

Note You need to log in before you can comment on or make changes to this bug.