Resolution for ntp Multiple Buffer Overflows via Specially Crafted Packets (CVE-2014-9293, CVE-2014-9294, CVE-2014-9295, CVE-2014-9296) in Red Hat Enterprise Linux
Issue
- Resolution for ntp Multiple Buffer Overflows via Specially Crafted Packets (CVE-2014-9293, CVE-2014-9294, CVE-2014-9295, CVE-2014-9296) in Red Hat Enterprise Linux.
- How do I avoid impact to a Red Hat Enterprise Linux system from CVE-2014-9293, CVE-2014-9294, CVE-2014-9295, and CVE-2014-9296 in Red Hat Enterprise Linux ?
- Regarding the Network Time Protocol Vulnerabilities Advisory ICSA-14-353-01, what should I do?
Environment
- Red Hat Enterprise Linux 7
- affected by CVE-2014-9293, CVE-2014-9294, CVE-2014-9295, CVE-2014-9296
- Red Hat Enterprise Linux 6
- affected by CVE-2014-9293, CVE-2014-9294, CVE-2014-9295, CVE-2014-9296
- Red Hat Enterprise Linux 5
- affected by CVE-2014-9293, CVE-2014-9294, CVE-2014-9295
- ntp, ntpdate
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.
Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.
