Mailinglist Archive: opensuse-updates (133 mails)

< Previous Next >
openSUSE-SU-2016:1423-1: moderate: Security update for ntp
openSUSE Security Update: Security update for ntp
______________________________________________________________________________

Announcement ID: openSUSE-SU-2016:1423-1
Rating: moderate
References: #782060 #905885 #910063 #916617 #920238 #926510
#936327 #942587 #944300 #946386 #951559 #951608
#951629 #954982 #956773 #957226 #962318 #962784
#962802 #962960 #962966 #962970 #962988 #962995
#963000 #963002 #975496 #977446 #977450 #977451
#977452 #977455 #977457 #977458 #977459 #977461
#977464
Cross-References: CVE-2015-5300 CVE-2015-7691 CVE-2015-7692
CVE-2015-7701 CVE-2015-7702 CVE-2015-7703
CVE-2015-7704 CVE-2015-7705 CVE-2015-7848
CVE-2015-7849 CVE-2015-7850 CVE-2015-7851
CVE-2015-7852 CVE-2015-7853 CVE-2015-7854
CVE-2015-7855 CVE-2015-7871 CVE-2015-7973
CVE-2015-7974 CVE-2015-7975 CVE-2015-7976
CVE-2015-7977 CVE-2015-7978 CVE-2015-7979
CVE-2015-8138 CVE-2015-8139 CVE-2015-8140
CVE-2015-8158 CVE-2016-1547 CVE-2016-1548
CVE-2016-1549 CVE-2016-1550 CVE-2016-1551
CVE-2016-2516 CVE-2016-2517 CVE-2016-2518
CVE-2016-2519
Affected Products:
openSUSE 13.2
______________________________________________________________________________

An update that fixes 37 vulnerabilities is now available.

Description:


This update for ntp fixes the following issues:

- Update to 4.2.8p7 (boo#977446):
* CVE-2016-1547, boo#977459: Validate crypto-NAKs, AKA: CRYPTO-NAK DoS.
* CVE-2016-1548, boo#977461: Interleave-pivot
* CVE-2016-1549, boo#977451: Sybil vulnerability: ephemeral association
attack.
* CVE-2016-1550, boo#977464: Improve NTP security against buffer
comparison timing attacks.
* CVE-2016-1551, boo#977450: Refclock impersonation vulnerability
* CVE-2016-2516, boo#977452: Duplicate IPs on unconfig directives will
cause an assertion botch in ntpd.
* CVE-2016-2517, boo#977455: remote configuration trustedkey/
requestkey/controlkey values are not properly validated.
* CVE-2016-2518, boo#977457: Crafted addpeer with hmode > 7 causes array
wraparound with MATCH_ASSOC.
* CVE-2016-2519, boo#977458: ctl_getitem() return value not always
checked.
* integrate ntp-fork.patch
* Improve the fixes for: CVE-2015-7704, CVE-2015-7705, CVE-2015-7974
- Restrict the parser in the startup script to the first
occurrance of "keys" and "controlkey" in ntp.conf (boo#957226).

- Enable compile-time support for MS-SNTP (--enable-ntp-signd). This
replaces the w32 patches in 4.2.4 that added the authreg directive.
(fate#320758).
- Fix ntp-sntp-dst.patch (boo#975496).
- Call /usr/sbin/sntp with full path to synchronize in start-ntpd. When
run as cron job, /usr/sbin/ is not in the path, which caused the
synchronization to fail. (boo#962318)
- Speedup ntpq (boo#782060, ntp-speedup-ntpq.patch).
- Sync service files with openSUSE Factory.

- Fix the TZ offset output of sntp during DST (boo#951559).

- Add ntp-fork.patch and build with threads disabled to allow name
resolution even when running chrooted.

- Update to 4.2.8p6:
* CVE-2015-8158, boo#962966: Potential Infinite Loop in ntpq.
* CVE-2015-8138, boo#963002: origin: Zero Origin Timestamp Bypass.
* CVE-2015-7979, boo#962784: Off-path Denial of Service (DoS) attack on
authenticated broadcast mode.
* CVE-2015-7978, boo#963000: Stack exhaustion in recursive traversal of
restriction list.
* CVE-2015-7977, boo#962970: reslist NULL pointer dereference.
* CVE-2015-7976, boo#962802: ntpq saveconfig command allows dangerous
characters in filenames.
* CVE-2015-7975, boo#962988: nextvar() missing length check.
* CVE-2015-7974, boo#962960: Skeleton Key: Missing key check allows
impersonation between authenticated peers.
* CVE-2015-7973, boo#962995: Deja Vu: Replay attack on authenticated
broadcast mode.
* CVE-2015-8140: ntpq vulnerable to replay attacks.
* CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin.
* CVE-2015-5300, boo#951629: Small-step/Big-step.
- Add /var/db/ntp-kod (boo#916617).
- Add ntp-ENOBUFS.patch to limit a warning that might happen quite a lot
on loaded systems (boo#956773).

- add ntp.bug2965.diff (boo#954982)
* fixes regression in 4.2.8p4 update

- Update to 4.2.8p4 to fix several security issues (boo#951608):
* CVE-2015-7871: NAK to the Future: Symmetric association authentication
bypass via crypto-NAK
* CVE-2015-7855: decodenetnum() will ASSERT botch instead of returning
FAIL on some bogus values
* CVE-2015-7854: Password Length Memory Corruption Vulnerability
* CVE-2015-7853: Invalid length data provided by a custom refclock
driver could cause a buffer overflow
* CVE-2015-7852 ntpq atoascii() Memory Corruption Vulnerability
* CVE-2015-7851 saveconfig Directory Traversal Vulnerability
* CVE-2015-7850 remote config logfile-keyfile
* CVE-2015-7849 trusted key use-after-free
* CVE-2015-7848 mode 7 loop counter underrun
* CVE-2015-7701 Slow memory leak in CRYPTO_ASSOC
* CVE-2015-7703 configuration directives "pidfile" and "driftfile"
should only be allowed locally
* CVE-2015-7704, CVE-2015-7705 Clients that receive a KoD should
validate the origin timestamp field
* CVE-2015-7691, CVE-2015-7692, CVE-2015-7702 Incomplete autokey data
packet length checks
* obsoletes ntp-memlock.patch.
- Add a controlkey line to /etc/ntp.conf if one does not already exist to
allow runtime configuuration via ntpq.

- Temporarily disable memlock to avoid problems due to high memory usage
during name resolution (boo#946386, ntp-memlock.patch).

- Use SHA1 instead of MD5 for symmetric keys (boo#905885).
- Improve runtime configuration:
* Read keytype from ntp.conf
* Don't write ntp keys to syslog.
- Fix legacy action scripts to pass on command line arguments.

- Remove ntp.1.gz, it wasn't installed anymore.
- Remove ntp-4.2.7-rh-manpages.tar.gz and only keep ntptime.8.gz. The rest
is partially irrelevant, partially redundant and potentially outdated
(boo#942587).
- Remove "kod" from the restrict line in ntp.conf (boo#944300).

- Use ntpq instead of deprecated ntpdc in start-ntpd (boo#936327).
- Add a controlkey to ntp.conf to make the above work.
- Don't let "keysdir" lines in ntp.conf trigger the "keys" parser.
- Disable mode 7 (ntpdc) again, now that we don't use it anymore.

- Add "addserver" as a new legacy action.
- Fix the comment regarding addserver in ntp.conf (boo#910063).

- Update to version 4.2.8p3 which incorporates all security fixes and most
other patches we have so far (fate#319040). More information on:
http://archive.ntp.org/ntp4/ChangeLog-stable
- Disable chroot by default (boo#926510).
- Enable ntpdc for backwards compatibility (boo#920238).

- Security fix: ntp-keygen may generate non-random symmetric keys


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 13.2:

zypper in -t patch openSUSE-2016-649=1

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 13.2 (i586 x86_64):

ntp-4.2.8p7-25.15.1
ntp-debuginfo-4.2.8p7-25.15.1
ntp-debugsource-4.2.8p7-25.15.1
ntp-doc-4.2.8p7-25.15.1


References:

https://www.suse.com/security/cve/CVE-2015-5300.html
https://www.suse.com/security/cve/CVE-2015-7691.html
https://www.suse.com/security/cve/CVE-2015-7692.html
https://www.suse.com/security/cve/CVE-2015-7701.html
https://www.suse.com/security/cve/CVE-2015-7702.html
https://www.suse.com/security/cve/CVE-2015-7703.html
https://www.suse.com/security/cve/CVE-2015-7704.html
https://www.suse.com/security/cve/CVE-2015-7705.html
https://www.suse.com/security/cve/CVE-2015-7848.html
https://www.suse.com/security/cve/CVE-2015-7849.html
https://www.suse.com/security/cve/CVE-2015-7850.html
https://www.suse.com/security/cve/CVE-2015-7851.html
https://www.suse.com/security/cve/CVE-2015-7852.html
https://www.suse.com/security/cve/CVE-2015-7853.html
https://www.suse.com/security/cve/CVE-2015-7854.html
https://www.suse.com/security/cve/CVE-2015-7855.html
https://www.suse.com/security/cve/CVE-2015-7871.html
https://www.suse.com/security/cve/CVE-2015-7973.html
https://www.suse.com/security/cve/CVE-2015-7974.html
https://www.suse.com/security/cve/CVE-2015-7975.html
https://www.suse.com/security/cve/CVE-2015-7976.html
https://www.suse.com/security/cve/CVE-2015-7977.html
https://www.suse.com/security/cve/CVE-2015-7978.html
https://www.suse.com/security/cve/CVE-2015-7979.html
https://www.suse.com/security/cve/CVE-2015-8138.html
https://www.suse.com/security/cve/CVE-2015-8139.html
https://www.suse.com/security/cve/CVE-2015-8140.html
https://www.suse.com/security/cve/CVE-2015-8158.html
https://www.suse.com/security/cve/CVE-2016-1547.html
https://www.suse.com/security/cve/CVE-2016-1548.html
https://www.suse.com/security/cve/CVE-2016-1549.html
https://www.suse.com/security/cve/CVE-2016-1550.html
https://www.suse.com/security/cve/CVE-2016-1551.html
https://www.suse.com/security/cve/CVE-2016-2516.html
https://www.suse.com/security/cve/CVE-2016-2517.html
https://www.suse.com/security/cve/CVE-2016-2518.html
https://www.suse.com/security/cve/CVE-2016-2519.html
https://bugzilla.suse.com/782060
https://bugzilla.suse.com/905885
https://bugzilla.suse.com/910063
https://bugzilla.suse.com/916617
https://bugzilla.suse.com/920238
https://bugzilla.suse.com/926510
https://bugzilla.suse.com/936327
https://bugzilla.suse.com/942587
https://bugzilla.suse.com/944300
https://bugzilla.suse.com/946386
https://bugzilla.suse.com/951559
https://bugzilla.suse.com/951608
https://bugzilla.suse.com/951629
https://bugzilla.suse.com/954982
https://bugzilla.suse.com/956773
https://bugzilla.suse.com/957226
https://bugzilla.suse.com/962318
https://bugzilla.suse.com/962784
https://bugzilla.suse.com/962802
https://bugzilla.suse.com/962960
https://bugzilla.suse.com/962966
https://bugzilla.suse.com/962970
https://bugzilla.suse.com/962988
https://bugzilla.suse.com/962995
https://bugzilla.suse.com/963000
https://bugzilla.suse.com/963002
https://bugzilla.suse.com/975496
https://bugzilla.suse.com/977446
https://bugzilla.suse.com/977450
https://bugzilla.suse.com/977451
https://bugzilla.suse.com/977452
https://bugzilla.suse.com/977455
https://bugzilla.suse.com/977457
https://bugzilla.suse.com/977458
https://bugzilla.suse.com/977459
https://bugzilla.suse.com/977461
https://bugzilla.suse.com/977464


< Previous Next >
This Thread
  • No further messages