Security update for ntp
Announcement ID: | SUSE-SU-2016:1584-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves five vulnerabilities and has three security fixes can now be installed.
Description:
ntp was updated to version 4.2.8p8 to fix five security issues.
These security issues were fixed: - CVE-2016-4953: Bad authentication demobilizes ephemeral associations (bsc#982065). - CVE-2016-4954: Processing spoofed server packets (bsc#982066). - CVE-2016-4955: Autokey association reset (bsc#982067). - CVE-2016-4956: Broadcast interleave (bsc#982068). - CVE-2016-4957: CRYPTO_NAK crash (bsc#982064).
These non-security issues were fixed: - Keep the parent process alive until the daemon has finished initialisation, to make sure that the PID file exists when the parent returns. - bsc#979302: Change the process name of the forking DNS worker process to avoid the impression that ntpd is started twice. - bsc#981422: Don't ignore SIGCHILD because it breaks wait(). - Separate the creation of ntp.keys and key #1 in it to avoid problems when upgrading installations that have the file, but no key #1, which is needed e.g. by "rcntp addserver".
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server 11 SP4
zypper in -t patch slessp4-ntp-12612=1
-
SLES for SAP Applications 11-SP4
zypper in -t patch slessp4-ntp-12612=1
Package List:
-
SUSE Linux Enterprise Server 11 SP4 (s390x x86_64 i586 ppc64 ia64)
- ntp-doc-4.2.8p8-14.1
- ntp-4.2.8p8-14.1
-
SLES for SAP Applications 11-SP4 (ppc64 x86_64)
- ntp-doc-4.2.8p8-14.1
- ntp-4.2.8p8-14.1
References:
- https://www.suse.com/security/cve/CVE-2016-4953.html
- https://www.suse.com/security/cve/CVE-2016-4954.html
- https://www.suse.com/security/cve/CVE-2016-4955.html
- https://www.suse.com/security/cve/CVE-2016-4956.html
- https://www.suse.com/security/cve/CVE-2016-4957.html
- https://bugzilla.suse.com/show_bug.cgi?id=979302
- https://bugzilla.suse.com/show_bug.cgi?id=981422
- https://bugzilla.suse.com/show_bug.cgi?id=982056
- https://bugzilla.suse.com/show_bug.cgi?id=982064
- https://bugzilla.suse.com/show_bug.cgi?id=982065
- https://bugzilla.suse.com/show_bug.cgi?id=982066
- https://bugzilla.suse.com/show_bug.cgi?id=982067
- https://bugzilla.suse.com/show_bug.cgi?id=982068