Описание
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9750, CVE-2014-9751. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 4.2.6.p5+dfsg-3ubuntu4 |
| esm-infra-legacy/trusty | released | 1:4.2.6.p5+dfsg-3ubuntu2.14.04.2 |
| lucid | released | 1:4.2.4p8+dfsg-1ubuntu2.3 |
| precise | released | 1:4.2.6.p3+dfsg-1ubuntu3.3 |
| trusty | released | 1:4.2.6.p5+dfsg-3ubuntu2.14.04.2 |
| trusty/esm | released | 1:4.2.6.p5+dfsg-3ubuntu2.14.04.2 |
| upstream | released | 1:4.2.6.p5+dfsg-4 |
| utopic | released | 1:4.2.6.p5+dfsg-3ubuntu2.14.10.2 |
Показывать по
Связанные уязвимости
A stack-based buffer overflow was found in the way the NTP autokey protocol was implemented. When an NTP client decrypted a secret received from an NTP server, it could cause that client to crash.
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9750, CVE-2014-9751. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage
ELSA-2015-1459: ntp security, bug fix, and enhancement update (MODERATE)