Oval Definition:oval:org.opensuse.security:def:74962
Revision Date:2020-12-01Version:1
Title:Security update for ntp (Moderate)
Description:

This update for ntp fixes the following issues:

ntp was updated to 4.2.8p15

- CVE-2020-11868: Fixed an issue which a server mode packet with spoofed source address frequently send to the client ntpd could have caused denial of service (bsc#1169740). - CVE-2018-8956: Fixed an issue which could have allowed remote attackers to prevent a broadcast client from synchronizing its clock with a broadcast NTP server via spoofed mode 3 and mode 5 packets (bsc#1171355). - CVE-2020-13817: Fixed an issue which an off-path attacker with the ability to query time from victim's ntpd instance could have modified the victim's clock by a limited amount (bsc#1172651). - CVE-2020-15025: Fixed an issue which remote attacker could have caused denial of service by consuming the memory when a CMAC key was used andassociated with a CMAC algorithm in the ntp.keys (bsc#1173334). - Removed an OpenSSL version warning (bsc#992038 and bsc#1125401).

This update was imported from the SUSE:SLE-15:Update update project.
Family:unixClass:patch
Status:Reference(s):1125401
1164903
1169740
1171355
1172651
1173334
1176031
992038
CVE-2018-8956
CVE-2020-11868
CVE-2020-13817
CVE-2020-15025
CVE-2020-24553
openSUSE-SU-2020:0934-1
openSUSE-SU-2020:1587-1
Platform(s):openSUSE Leap 15.1
openSUSE Leap 15.2
Product(s):
Definition Synopsis
  • openSUSE Leap 15.1 is installed
  • AND Package Information
  • ntp-4.2.8p15-lp151.2.3 is installed
  • OR ntp-doc-4.2.8p15-lp151.2.3 is installed
  • Definition Synopsis
  • openSUSE Leap 15.2 is installed
  • AND Package Information
  • go1.14-1.14.9-lp152.2.6 is installed
  • OR go1.14-doc-1.14.9-lp152.2.6 is installed
  • OR go1.14-race-1.14.9-lp152.2.6 is installed
  • BACK