Linux Today: Linux News On Internet Time.

Mandrake Security Update Advisory: MDKSA-2001:036 - ntp/xntp3 update

Apr 06, 2001, 19:48 (4 Talkback[s])
Date:         Fri, 6 Apr 2001 09:31:25 -0600
From: Linux Mandrake Security Team <security@LINUX-MANDRAKE.COM>
Subject:      MDKSA-2001:036 - ntp/xntp3 update


                Linux-Mandrake Security Update Advisory

Package name:           ntp/xntp3
Date:                   April 6th, 2001
Advisory ID:            MDKSA-2001:036

Affected versions:      6.0, 6.1, 7.0, 7.1, 7.2, Corporate Server 1.0.1

Problem Description:

 Przemyslaw Frasunek <venglin@FREEBSD.LUBLIN.PL> reported that ntp
 daemons such as ntp and xntp3 are vulnerable to a buffer overflow that
 can lead to a remote root exploit.  Linux-Mandrake users are urged to
 upgrade ntp and xntp3 immediately.

Please verify the update prior to upgrading to ensure the integrity of
the downloaded package.  You can do this with the command:
  rpm --checksig package.rpm
You can get the GPG public key of the Linux-Mandrake Security Team at
If you use MandrakeUpdate, the verification of md5 checksum and GPG
signature is performed automatically for you.

Linux-Mandrake 6.0:
962038bacbddbeb3b6fd60437d9e0a16  6.0/RPMS/xntp3-5.93-9.4mdk.i586.rpm
59535e0387f876e8359c2e6006aee412  6.0/SRPMS/xntp3-5.93-9.4mdk.src.rpm

Linux-Mandrake 6.1:
e3290d013fdad5655fa00fe2671ead77  6.1/RPMS/xntp3-5.93-9.4mdk.i586.rpm
59535e0387f876e8359c2e6006aee412  6.1/SRPMS/xntp3-5.93-9.4mdk.src.rpm

Linux-Mandrake 7.0:
10d5665e96d4732fb50afac597b55b49  7.0/RPMS/xntp3-5.93-9.3mdk.i586.rpm
afb2de97e04dae55d0d28d5733db4352  7.0/SRPMS/xntp3-5.93-9.3mdk.src.rpm

Linux-Mandrake 7.1:
b838be30d640e9ec66a889ae40befcec  7.1/RPMS/ntp-4.0.99k-3.1mdk.i586.rpm
426adc36d33cca4bc79b42d2e27bdf90  7.1/RPMS/xntp3-5.93-9.2mdk.i586.rpm
fdde309e6374143810423b01c58734f0  7.1/SRPMS/ntp-4.0.99k-3.1mdk.src.rpm
0169a707d04905c11c797f80158d019a  7.1/SRPMS/xntp3-5.93-9.2mdk.src.rpm

Linux-Mandrake 7.2:
78510269b88b75b90fbb28cb5ecd7d0b  7.2/RPMS/ntp-4.0.99k-3.1mdk.i586.rpm
d1be8a263979dfcc9549aa0193b3bc43  7.2/RPMS/xntp3-5.93-9.1mdk.i586.rpm
fdde309e6374143810423b01c58734f0  7.2/SRPMS/ntp-4.0.99k-3.1mdk.src.rpm
ed9ff666ed28bbf050558cbb6d824dbf  7.2/SRPMS/xntp3-5.93-9.1mdk.src.rpm

Corporate Server 1.0.1:
b838be30d640e9ec66a889ae40befcec  1.0.1/RPMS/ntp-4.0.99k-3.1mdk.i586.rpm
426adc36d33cca4bc79b42d2e27bdf90  1.0.1/RPMS/xntp3-5.93-9.2mdk.i586.rpm
fdde309e6374143810423b01c58734f0  1.0.1/SRPMS/ntp-4.0.99k-3.1mdk.src.rpm
0169a707d04905c11c797f80158d019a  1.0.1/SRPMS/xntp3-5.93-9.2mdk.src.rpm

To upgrade automatically, use MandrakeUpdate.

If you want to upgrade manually, download the updated package from one
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm".

You can download the updates directly from one of the mirror sites
listed at:


Updated packages are available in the "updates/[ver]/RPMS/" directory.
For example, if you are looking for an updated RPM package for
Linux-Mandrake 7.2, look for it in "updates/7.2/RPMS/".  Updated source
RPMs are available as well, but you generally do not need to download

Please be aware that sometimes it takes the mirrors a few hours to

You can view other security advisories for Linux-Mandrake at:


If you want to report vulnerabilities, please contact


Linux-Mandrake has two security-related mailing list services that
anyone can subscribe to:


  Linux-Mandrake's security announcements mailing list.  Only
  announcements are sent to this list and it is read-only.


  Linux-Mandrake's security discussion mailing list.  This list is open
  to anyone to discuss Linux-Mandrake security specifically and Linux
  security in general.

To subscribe to either list, send a message to
with "subscribe [listname]" in the body of the message.

To remove yourself from either list, send a message to
with "unsubscribe [listname]" in the body of the message.

To get more information on either list, send a message to
with "info [listname]" in the body of the message.

Optionally, you can use the web interface to subscribe to or unsubscribe
from either list: