Mailinglist Archive: opensuse-updates (82 mails)

< Previous Next >
openSUSE-SU-2018:0970-1: moderate: Security update for ntp
openSUSE Security Update: Security update for ntp

Announcement ID: openSUSE-SU-2018:0970-1
Rating: moderate
References: #1077445 #1082063 #1082210 #1083417 #1083420
#1083422 #1083424 #1083426
Cross-References: CVE-2016-1549 CVE-2018-7170 CVE-2018-7182
CVE-2018-7183 CVE-2018-7184 CVE-2018-7185

Affected Products:
openSUSE Leap 42.3

An update that solves 6 vulnerabilities and has two fixes
is now available.


This update for ntp fixes the following issues:

- Update to 4.2.8p11 (bsc#1082210):
* CVE-2016-1549: Sybil vulnerability: ephemeral association attack.
While fixed in ntp-4.2.8p7, there are significant additional
protections for this issue in 4.2.8p11.
* CVE-2018-7182: ctl_getitem(): buffer read overrun leads to undefined
behavior and information leak. (bsc#1083426)
* CVE-2018-7170: Multiple authenticated ephemeral associations.
* CVE-2018-7184: Interleaved symmetric mode cannot recover from bad
state. (bsc#1083422)
* CVE-2018-7185: Unauthenticated packet can reset authenticated
interleaved association. (bsc#1083420)
* CVE-2018-7183: ntpq:decodearr() can write beyond its buffer
- Don't use libevent's cached time stamps in sntp. (bsc#1077445)

This update was imported from the SUSE:SLE-12-SP1:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended
installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 42.3:

zypper in -t patch openSUSE-2018-376=1

Package List:

- openSUSE Leap 42.3 (i586 x86_64):



< Previous Next >
This Thread
  • No further messages