SUSE-SU-2015:2058-1: moderate: Security update for ntp
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Fri Nov 20 06:11:03 MST 2015
SUSE Security Update: Security update for ntp
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:2058-1
Rating: moderate
References: #905885 #910063 #936327 #942441 #942587 #944300
#951608
Cross-References: CVE-2015-7691 CVE-2015-7692 CVE-2015-7701
CVE-2015-7702 CVE-2015-7703 CVE-2015-7704
CVE-2015-7705 CVE-2015-7848 CVE-2015-7849
CVE-2015-7850 CVE-2015-7851 CVE-2015-7852
CVE-2015-7853 CVE-2015-7854 CVE-2015-7855
CVE-2015-7871
Affected Products:
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Desktop 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP4
______________________________________________________________________________
An update that fixes 16 vulnerabilities is now available.
Description:
This ntp update provides the following security and non security fixes:
- Update to 4.2.8p4 to fix several security issues (bsc#951608):
* CVE-2015-7871: NAK to the Future: Symmetric association authentication
bypass via crypto-NAK
* CVE-2015-7855: decodenetnum() will ASSERT botch instead of returning
FAIL on some bogus values
* CVE-2015-7854: Password Length Memory Corruption Vulnerability
* CVE-2015-7853: Invalid length data provided by a custom refclock
driver could cause a buffer overflow
* CVE-2015-7852 ntpq atoascii() Memory Corruption Vulnerability
* CVE-2015-7851 saveconfig Directory Traversal Vulnerability
* CVE-2015-7850 remote config logfile-keyfile
* CVE-2015-7849 trusted key use-after-free
* CVE-2015-7848 mode 7 loop counter underrun
* CVE-2015-7701 Slow memory leak in CRYPTO_ASSOC
* CVE-2015-7703 configuration directives "pidfile" and "driftfile"
should only be allowed locally
* CVE-2015-7704, CVE-2015-7705 Clients that receive a KoD should
validate the origin timestamp field
* CVE-2015-7691, CVE-2015-7692, CVE-2015-7702 Incomplete autokey data
packet length checks
- Use ntpq instead of deprecated ntpdc in start-ntpd (bnc#936327).
- Add a controlkey to ntp.conf to make the above work.
- Improve runtime configuration:
* Read keytype from ntp.conf
* Don't write ntp keys to syslog.
- Don't let "keysdir" lines in ntp.conf trigger the "keys" parser.
- Fix the comment regarding addserver in ntp.conf (bnc#910063).
- Remove ntp.1.gz, it wasn't installed anymore.
- Remove ntp-4.2.7-rh-manpages.tar.gz and only keep ntptime.8.gz. The rest
is partially irrelevant, partially redundant and potentially outdated
(bsc#942587).
- Remove "kod" from the restrict line in ntp.conf (bsc#944300).
- Use SHA1 instead of MD5 for symmetric keys (bsc#905885).
- Require perl-Socket6 (bsc#942441).
- Fix incomplete backporting of "rcntp ntptimemset".
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11-SP4:
zypper in -t patch slessp4-ntp-12218=1
- SUSE Linux Enterprise Desktop 11-SP4:
zypper in -t patch sledsp4-ntp-12218=1
- SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-ntp-12218=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11-SP4 (i586 ia64 ppc64 s390x x86_64):
ntp-4.2.8p4-5.1
ntp-doc-4.2.8p4-5.1
- SUSE Linux Enterprise Desktop 11-SP4 (i586 x86_64):
ntp-4.2.8p4-5.1
ntp-doc-4.2.8p4-5.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
ntp-debuginfo-4.2.8p4-5.1
ntp-debugsource-4.2.8p4-5.1
References:
https://www.suse.com/security/cve/CVE-2015-7691.html
https://www.suse.com/security/cve/CVE-2015-7692.html
https://www.suse.com/security/cve/CVE-2015-7701.html
https://www.suse.com/security/cve/CVE-2015-7702.html
https://www.suse.com/security/cve/CVE-2015-7703.html
https://www.suse.com/security/cve/CVE-2015-7704.html
https://www.suse.com/security/cve/CVE-2015-7705.html
https://www.suse.com/security/cve/CVE-2015-7848.html
https://www.suse.com/security/cve/CVE-2015-7849.html
https://www.suse.com/security/cve/CVE-2015-7850.html
https://www.suse.com/security/cve/CVE-2015-7851.html
https://www.suse.com/security/cve/CVE-2015-7852.html
https://www.suse.com/security/cve/CVE-2015-7853.html
https://www.suse.com/security/cve/CVE-2015-7854.html
https://www.suse.com/security/cve/CVE-2015-7855.html
https://www.suse.com/security/cve/CVE-2015-7871.html
https://bugzilla.suse.com/905885
https://bugzilla.suse.com/910063
https://bugzilla.suse.com/936327
https://bugzilla.suse.com/942441
https://bugzilla.suse.com/942587
https://bugzilla.suse.com/944300
https://bugzilla.suse.com/951608
More information about the sle-security-updates
mailing list