Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 22 Apr 2015 14:55:16 +0200
From: Martin Prpic <>
To: "oss-security\" <>
CC: "CVE Assignments MITRE" <>
Subject: Re: CVE request: ntp-keygen may generate non-random symmetric keys on big-endian systems

Hi, this still has no CVE assigned. Thanks!

Martin Prpic writes:

> Hi, the recent NTP update (ntp-4.2.8p2) contains a fix for the following
> issue:
> * [Bug 2797] ntp-keygen trapped in endless loop for MD5 keys on big-endian machines.
> Patch:
> While the endless loop is not a security flaw per se, the fact that
> ntp-keygen generates non-random keys is. If the lowest byte of the temp
> variable happens to be between 0x20 and 0x7f and not #, the generated
> MD5 key will consist of 20 identical characters, meaning only 93
> possible keys can be generated.
> Can a CVE be please assigned for this issue?
> Thank you!

Martin Prpič / Red Hat Product Security

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ