Revision Date: | 2018-06-20 | Version: | 1 |
Title: | Security update for ntp (Moderate) |
Description: |
This update for ntp fixes the following issues:
- Update to 4.2.8p11 (bsc#1082210): * CVE-2016-1549: Sybil vulnerability: ephemeral association attack. While fixed in ntp-4.2.8p7, there are significant additional protections for this issue in 4.2.8p11. * CVE-2018-7182: ctl_getitem(): buffer read overrun leads to undefined behavior and information leak. (bsc#1083426) * CVE-2018-7170: Multiple authenticated ephemeral associations. (bsc#1083424) * CVE-2018-7184: Interleaved symmetric mode cannot recover from bad state. (bsc#1083422) * CVE-2018-7185: Unauthenticated packet can reset authenticated interleaved association. (bsc#1083420) * CVE-2018-7183: ntpq:decodearr() can write beyond its buffer limit.(bsc#1083417) - Don't use libevent's cached time stamps in sntp. (bsc#1077445)
This update is a reissue of the previous update with LTSS channels included.
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1077445 1082063 1082210 1083417 1083420 1083422 1083424 1083426 CVE-2016-1549 CVE-2018-7170 CVE-2018-7182 CVE-2018-7183 CVE-2018-7184 CVE-2018-7185 SUSE-SU-2018:1765-1
|
Platform(s): | SUSE Linux Enterprise Desktop 12 SP3
| Product(s): | |
Definition Synopsis |
SUSE Linux Enterprise Desktop 12 SP3 is installed AND Package Information
ntp-4.2.8p11-64.5.1 is installed
OR ntp-doc-4.2.8p11-64.5.1 is installed
|