Bug 1852114 - ntp: memory leak with CMAC keys can lead to DoS
Summary: ntp: memory leak with CMAC keys can lead to DoS
Keywords:
Status: CLOSED DUPLICATE of bug 1850530
Alias: None
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1850531 1852115
Blocks: 1852116
TreeView+ depends on / blocked
 
Reported: 2020-06-29 18:45 UTC by Guilherme de Almeida Suckevicz
Modified: 2023-10-06 20:55 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2020-07-08 01:51:18 UTC
Embargoed:


Attachments (Terms of Use)

Description Guilherme de Almeida Suckevicz 2020-06-29 18:45:01 UTC
ntpd in ntp 4.2.8 before 4.2.8p15 and 4.3.x before 4.3.101 allows remote attackers to cause a denial of service (memory consumption) by sending packets, because memory is not freed in situations where a CMAC key is used and associated with a CMAC algorithm in the ntp.keys file.

References:
https://support.ntp.org/bin/view/Main/NtpBug3661
https://support.ntp.org/bin/view/Main/SecurityNotice#June_2020_ntp_4_2_8p15_NTP_Relea

Comment 1 Guilherme de Almeida Suckevicz 2020-06-29 18:45:17 UTC
Created ntp tracking bugs for this issue:

Affects: fedora-all [bug 1852115]

Comment 3 Doran Moppert 2020-07-08 01:51:18 UTC

*** This bug has been marked as a duplicate of bug 1850530 ***


Note You need to log in before you can comment on or make changes to this bug.