SUSE-SU-2015:0865-1

Source
https://www.suse.com/support/update/announcement/2015/suse-su-20150865-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2015:0865-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2015:0865-1
Related
Published
2015-04-28T12:17:23Z
Modified
2015-04-28T12:17:23Z
Summary
Security update for ntp
Details

ntp was updated to fix two security related flaws as well as 'slew' mode handling for leap seconds.

The following vulnerabilities were fixe:

  • ntpd could accept unauthenticated packets with symmetric key crypto. (CVE-2015-1798)
  • ntpd authentication did not protect symmetric associations against DoS attacks (CVE-2015-1799)
  • ntp-keygen may generate non-random symmetric keys on big-endian systems (bsc#928321, CVE-2015-3405).

The following non-security issues were fixed:

  • Fix slew mode for leap seconds (bnc#918342).
References

Affected packages

SUSE:Linux Enterprise Desktop 12 / ntp

Package

Name
ntp
Purl
pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Desktop%2012

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.2.6p5-44.1

Ecosystem specific

{
    "binaries": [
        {
            "ntp-doc": "4.2.6p5-44.1",
            "ntp": "4.2.6p5-44.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 / ntp

Package

Name
ntp
Purl
pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2012

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.2.6p5-44.1

Ecosystem specific

{
    "binaries": [
        {
            "ntp-doc": "4.2.6p5-44.1",
            "ntp": "4.2.6p5-44.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 12 / ntp

Package

Name
ntp
Purl
pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.2.6p5-44.1

Ecosystem specific

{
    "binaries": [
        {
            "ntp-doc": "4.2.6p5-44.1",
            "ntp": "4.2.6p5-44.1"
        }
    ]
}