Security update for ntp
Announcement ID: | SUSE-SU-2015:2058-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 16 vulnerabilities can now be installed.
Description:
This ntp update provides the following security and non security fixes:
- Update to 4.2.8p4 to fix several security issues (bsc#951608):
- CVE-2015-7871: NAK to the Future: Symmetric association authentication bypass via crypto-NAK
- CVE-2015-7855: decodenetnum() will ASSERT botch instead of returning FAIL on some bogus values
- CVE-2015-7854: Password Length Memory Corruption Vulnerability
- CVE-2015-7853: Invalid length data provided by a custom refclock driver could cause a buffer overflow
- CVE-2015-7852 ntpq atoascii() Memory Corruption Vulnerability
- CVE-2015-7851 saveconfig Directory Traversal Vulnerability
- CVE-2015-7850 remote config logfile-keyfile
- CVE-2015-7849 trusted key use-after-free
- CVE-2015-7848 mode 7 loop counter underrun
- CVE-2015-7701 Slow memory leak in CRYPTO_ASSOC
- CVE-2015-7703 configuration directives "pidfile" and "driftfile" should only be allowed locally
- CVE-2015-7704, CVE-2015-7705 Clients that receive a KoD should validate the origin timestamp field
- CVE-2015-7691, CVE-2015-7692, CVE-2015-7702 Incomplete autokey data packet length checks
- Use ntpq instead of deprecated ntpdc in start-ntpd (bnc#936327).
- Add a controlkey to ntp.conf to make the above work.
- Improve runtime configuration:
- Read keytype from ntp.conf
- Don't write ntp keys to syslog.
- Don't let "keysdir" lines in ntp.conf trigger the "keys" parser.
- Fix the comment regarding addserver in ntp.conf (bnc#910063).
- Remove ntp.1.gz, it wasn't installed anymore.
- Remove ntp-4.2.7-rh-manpages.tar.gz and only keep ntptime.8.gz. The rest is partially irrelevant, partially redundant and potentially outdated (bsc#942587).
- Remove "kod" from the restrict line in ntp.conf (bsc#944300).
- Use SHA1 instead of MD5 for symmetric keys (bsc#905885).
- Require perl-Socket6 (bsc#942441).
- Fix incomplete backporting of "rcntp ntptimemset".
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Desktop 11 SP4
zypper in -t patch sledsp4-ntp-12218=1
-
SUSE Linux Enterprise Server 11 SP4
zypper in -t patch slessp4-ntp-12218=1
-
SLES for SAP Applications 11-SP4
zypper in -t patch slessp4-ntp-12218=1
Package List:
-
SUSE Linux Enterprise Desktop 11 SP4 (x86_64 i586)
- ntp-doc-4.2.8p4-5.1
- ntp-4.2.8p4-5.1
-
SUSE Linux Enterprise Server 11 SP4 (s390x x86_64 i586 ppc64 ia64)
- ntp-doc-4.2.8p4-5.1
- ntp-4.2.8p4-5.1
-
SLES for SAP Applications 11-SP4 (ppc64 x86_64)
- ntp-doc-4.2.8p4-5.1
- ntp-4.2.8p4-5.1
References:
- https://www.suse.com/security/cve/CVE-2015-7691.html
- https://www.suse.com/security/cve/CVE-2015-7692.html
- https://www.suse.com/security/cve/CVE-2015-7701.html
- https://www.suse.com/security/cve/CVE-2015-7702.html
- https://www.suse.com/security/cve/CVE-2015-7703.html
- https://www.suse.com/security/cve/CVE-2015-7704.html
- https://www.suse.com/security/cve/CVE-2015-7705.html
- https://www.suse.com/security/cve/CVE-2015-7848.html
- https://www.suse.com/security/cve/CVE-2015-7849.html
- https://www.suse.com/security/cve/CVE-2015-7850.html
- https://www.suse.com/security/cve/CVE-2015-7851.html
- https://www.suse.com/security/cve/CVE-2015-7852.html
- https://www.suse.com/security/cve/CVE-2015-7853.html
- https://www.suse.com/security/cve/CVE-2015-7854.html
- https://www.suse.com/security/cve/CVE-2015-7855.html
- https://www.suse.com/security/cve/CVE-2015-7871.html
- https://bugzilla.suse.com/show_bug.cgi?id=905885
- https://bugzilla.suse.com/show_bug.cgi?id=910063
- https://bugzilla.suse.com/show_bug.cgi?id=936327
- https://bugzilla.suse.com/show_bug.cgi?id=942441
- https://bugzilla.suse.com/show_bug.cgi?id=942587
- https://bugzilla.suse.com/show_bug.cgi?id=944300
- https://bugzilla.suse.com/show_bug.cgi?id=951608