Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 09 Apr 2015 14:45:27 +0200
From: Martin Prpic <>
To: "oss-security\" <>
Subject: CVE request: ntp-keygen may generate non-random symmetric keys on big-endian systems

Hi, the recent NTP update (ntp-4.2.8p2) contains a fix for the following

* [Bug 2797] ntp-keygen trapped in endless loop for MD5 keys on big-endian machines.


While the endless loop is not a security flaw per se, the fact that
ntp-keygen generates non-random keys is. If the lowest byte of the temp
variable happens to be between 0x20 and 0x7f and not #, the generated
MD5 key will consist of 20 identical characters, meaning only 93
possible keys can be generated.

Can a CVE be please assigned for this issue?

Thank you!

Martin Prpič / Red Hat Product Security

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.