[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [linux-security] ALERT: remote root exploit in ntpd (redhat, slackware)
On Fri, Apr 06, 2001 at 07:09:23PM -0700, Martin Siegert wrote:
> Topic
> =====
> possibility of remote root exploit in ntpd (time synchronization).
RedHat and Slackware have release patched versions of ntp.
Here is the upgrade information:
RedHat 6.x
----------
rpm -Fvh xntp3-5.93-15.i386.rpm
/etc/rc.d/init.d/xntpd restart
RedHat 7.0
----------
rpm -Fvh ntp-4.0.99k-15.i386.rpm
/etc/rc.d/init.d/ntpd restart
Slackware 7.1
-------------
upgrade to xntp3-5.93e (xntp.tgz):
Make sure you are not running xntpd on your system. This command
should stop the daemon:
killall xntpd
Check to make sure it's not running:
ps -ef | grep xntpd
Once you have stopped the daemon, upgrade the package using
upgradepkg:
upgradepkg xntp.tgz
Then you can restart the daemon:
/usr/sbin/xntpd
Slackware-current
-----------------
upgrade to ntp-4.0.99k23 (ntp4.tgz):
Make sure you are not running xntpd on your system. This command
should stop the daemon:
killall xntpd
Check to make sure it's not running:
ps -ef | grep xntpd
Once you have stopped the daemon, upgrade the package using
upgradepkg:
upgradepkg xntp%ntp4
Then you can restart the daemon:
/usr/sbin/ntpd