SUSE-SU-2018:1464-1

Source
https://www.suse.com/support/update/announcement/2018/suse-su-20181464-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2018:1464-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2018:1464-1
Related
Published
2018-05-29T14:44:40Z
Modified
2018-05-29T14:44:40Z
Summary
Security update for ntp
Details

This update for ntp fixes the following issues:

  • Update to 4.2.8p11 (bsc#1082210):
    • CVE-2016-1549: Sybil vulnerability: ephemeral association attack. While fixed in ntp-4.2.8p7, there are significant additional protections for this issue in 4.2.8p11.
    • CVE-2018-7182: ctl_getitem(): buffer read overrun leads to undefined behavior and information leak. (bsc#1083426)
    • CVE-2018-7170: Multiple authenticated ephemeral associations. (bsc#1083424)
    • CVE-2018-7184: Interleaved symmetric mode cannot recover from bad state. (bsc#1083422)
    • CVE-2018-7185: Unauthenticated packet can reset authenticated interleaved association. (bsc#1083420)
    • CVE-2018-7183: ntpq:decodearr() can write beyond its buffer limit.(bsc#1083417)
  • Don't use libevent's cached time stamps in sntp. (bsc#1077445)
  • Fix systemd migration in %pre (bsc#1034892).
References

Affected packages

SUSE:Linux Enterprise Server 12-LTSS / ntp

Package

Name
ntp
Purl
pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.2.8p11-46.26.2

Ecosystem specific

{
    "binaries": [
        {
            "ntp-doc": "4.2.8p11-46.26.2",
            "ntp": "4.2.8p11-46.26.2"
        }
    ]
}