SUSE-SU-2021:4147-1: moderate: Security update for chrony
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Wed Dec 22 14:34:15 UTC 2021
SUSE Security Update: Security update for chrony
______________________________________________________________________________
Announcement ID: SUSE-SU-2021:4147-1
Rating: moderate
References: #1063704 #1069468 #1082318 #1083597 #1099272
#1115529 #1128846 #1156884 #1159840 #1161119
#1162964 #1171806 #1172113 #1173277 #1173760
#1174075 #1174911 #1180689 #1181826 #1183783
#1184400 #1187906 #1190926 SLE-11424 SLE-22248
SLE-22292
Cross-References: CVE-2020-14367
CVSS scores:
CVE-2020-14367 (NVD) : 6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
CVE-2020-14367 (SUSE): 6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
Affected Products:
SUSE OpenStack Cloud Crowbar 9
SUSE OpenStack Cloud Crowbar 8
SUSE OpenStack Cloud 9
SUSE OpenStack Cloud 8
SUSE Linux Enterprise Server for SAP 12-SP4
SUSE Linux Enterprise Server for SAP 12-SP3
SUSE Linux Enterprise Server 12-SP5
SUSE Linux Enterprise Server 12-SP4-LTSS
SUSE Linux Enterprise Server 12-SP3-LTSS
SUSE Linux Enterprise Server 12-SP3-BCL
SUSE Linux Enterprise Server 12-SP2-BCL
HPE Helion Openstack 8
______________________________________________________________________________
An update that solves one vulnerability, contains three
features and has 22 fixes is now available.
Description:
This update for chrony fixes the following issues:
Chrony was updated to 4.1:
* Add support for NTS servers specified by IP address (matching Subject
Alternative Name in server certificate)
* Add source-specific configuration of trusted certificates
* Allow multiple files and directories with trusted certificates
* Allow multiple pairs of server keys and certificates
* Add copy option to server/pool directive
* Increase PPS lock limit to 40% of pulse interval
* Perform source selection immediately after loading dump files
* Reload dump files for addresses negotiated by NTS-KE server
* Update seccomp filter and add less restrictive level
* Restart ongoing name resolution on online command
* Fix dump files to not include uncorrected offset
* Fix initstepslew to accept time from own NTP clients
* Reset NTP address and port when no longer negotiated by NTS-KE server
- Update clknetsim to snapshot f89702d.
- Ensure the correct pool packages are installed for openSUSE and SLE
(bsc#1180689).
- Enable syscallfilter unconditionally (bsc#1181826).
Chrony was updated to 4.0:
Enhancements
- Add support for Network Time Security (NTS) authentication
- Add support for AES-CMAC keys (AES128, AES256) with Nettle
- Add authselectmode directive to control selection of unauthenticated
sources
- Add binddevice, bindacqdevice, bindcmddevice directives
- Add confdir directive to better support fragmented configuration
- Add sourcedir directive and "reload sources" command to support dynamic
NTP sources specified in files
- Add clockprecision directive
- Add dscp directive to set Differentiated Services Code Point (DSCP)
- Add -L option to limit log messages by severity
- Add -p option to print whole configuration with included files
- Add -U option to allow start under non-root user
- Allow maxsamples to be set to 1 for faster update with -q/-Q
option
- Avoid replacing NTP sources with sources that have unreachable address
- Improve pools to repeat name resolution to get "maxsources" sources
- Improve source selection with trusted sources
- Improve NTP loop test to prevent synchronisation to itself
- Repeat iburst when NTP source is switched from offline state to online
- Update clock synchronisation status and leap status more frequently
- Update seccomp filter
- Add "add pool" command
- Add "reset sources" command to drop all measurements
- Add authdata command to print details about NTP authentication
- Add selectdata command to print details about source selection
- Add -N option and sourcename command to print original names
of sources
- Add -a option to some commands to print also unresolved sources
- Add -k, -p, -r options to clients command to select, limit, reset data
- Bug fixes
- Donât set interface for NTP responses to allow asymmetric routing
- Handle RTCs that donât support interrupts
- Respond to command requests with correct address on multihomed hosts
- Removed features
- Drop support for RIPEMD keys (RMD128, RMD160, RMD256, RMD320)
- Drop support for long (non-standard) MACs in NTPv4 packets (chrony 2.x
clients using non-MD5/SHA1 keys need to use
option "version 3")
- By default we don't write log files but log to journald, so
only recommend logrotate.
- Adjust and rename the sysconfig file, so that it matches the
expectations of chronyd.service (bsc#1173277).
Chrony was updated to 3.5.1:
* Create new file when writing pidfile (CVE-2020-14367, bsc#1174911)
- Add chrony-pool-suse and chrony-pool-openSUSE subpackages that
preconfigure chrony to use NTP servers from the respective pools for
SUSE and openSUSE (bsc#1156884, SLE-11424).
- Add chrony-pool-empty to still allow installing chrony without
preconfigured servers.
- Use iburst in the default pool statements to speed up initial
synchronisation (bsc#1172113).
- Update clknetsim to version 79ffe44 (fixes bsc#1162964).
Update to 3.5:
+ Add support for more accurate reading of PHC on Linux 5.0
+ Add support for hardware timestamping on interfaces with read-only
timestamping configuration
+ Add support for memory locking and real-time priority on FreeBSD,
NetBSD, Solaris
+ Update seccomp filter to work on more architectures
+ Validate refclock driver options
+ Fix bindaddress directive on FreeBSD
+ Fix transposition of hardware RX timestamp on Linux 4.13 and later
+ Fix building on non-glibc systems
- Fix location of helper script in chrony-dnssrv at .service (bsc#1128846).
- Read runtime servers from /var/run/netconfig/chrony.servers (bsc#1099272)
- Move chrony-helper to /usr/lib/chrony/helper, because there should be no
executables in /usr/share.
- Remove discrepancies between spec file and chrony-tmpfiles (bsc#1115529)
Update to version 3.4
* Enhancements
+ Add filter option to server/pool/peer directive
+ Add minsamples and maxsamples options to hwtimestamp directive
+ Add support for faster frequency adjustments in Linux 4.19
+ Change default pidfile to /var/run/chrony/chronyd.pid to allow chronyd
without root privileges to remove it on exit
+ Disable sub-second polling intervals for distant NTP sources
+ Extend range of supported sub-second polling intervals
+ Get/set IPv4 destination/source address of NTP packets on FreeBSD
+ Make burst options and command useful with short polling intervals
+ Modify auto_offline option to activate when sending request failed
+ Respond from interface that received NTP request if possible
+ Add onoffline command to switch between online and offline state
according to current system network configuration
+ Improve example NetworkManager dispatcher script
* Bug fixes
+ Avoid waiting in Linux getrandom system call
+ Fix PPS support on FreeBSD and NetBSD
Update to version 3.3
* Enhancements:
+ Add burst option to server/pool directive
+ Add stratum and tai options to refclock directive
+ Add support for Nettle crypto library
+ Add workaround for missing kernel receive timestamps on Linux
+ Wait for late hardware transmit timestamps
+ Improve source selection with unreachable sources
+ Improve protection against replay attacks on symmetric mode
+ Allow PHC refclock to use socket in /var/run/chrony
+ Add shutdown command to stop chronyd
+ Simplify format of response to manual list command
+ Improve handling of unknown responses in chronyc
* Bug fixes:
+ Respond to NTPv1 client requests with zero mode
+ Fix -x option to not require CAP_SYS_TIME under non-root user
+ Fix acquisitionport directive to work with privilege separation
+ Fix handling of socket errors on Linux to avoid high CPU usage
+ Fix chronyc to not get stuck in infinite loop after clock step
- Added /etc/chrony.d/ directory to the package (bsc#1083597) Modifed
default chrony.conf to add "include /etc/chrony.d/*"
- Enable pps support
Upgraded to version 3.2:
Enhancements
* Improve stability with NTP sources and reference clocks
* Improve stability with hardware timestamping
* Improve support for NTP interleaved modes
* Control frequency of system clock on macOS 10.13 and later
* Set TAI-UTC offset of system clock with leapsectz directive
* Minimise data in client requests to improve privacy
* Allow transmit-only hardware timestamping
* Add support for new timestamping options introduced in Linux 4.13
* Add root delay, root dispersion and maximum error to tracking log
* Add mindelay and asymmetry options to server/peer/pool directive
* Add extpps option to PHC refclock to timestamp external PPS signal
* Add pps option to refclock directive to treat any refclock as PPS
* Add width option to refclock directive to filter wrong pulse edges
* Add rxfilter option to hwtimestamp directive
* Add -x option to disable control of system clock
* Add -l option to log to specified file instead of syslog
* Allow multiple command-line options to be specified together
* Allow starting without root privileges with -Q option
* Update seccomp filter for new glibc versions
* Dump history on exit by default with dumpdir directive
* Use hardening compiler options by default
Bug fixes
* Don't drop PHC samples with low-resolution system clock
* Ignore outliers in PHC tracking, RTC tracking, manual input
* Increase polling interval when peer is not responding
* Exit with error message when include directive fails
* Don't allow slash after hostname in allow/deny directive/command
* Try to connect to all addresses in chronyc before giving up
Upgraded to version 3.1:
- Enhancements
- Add support for precise cross timestamping of PHC on Linux
- Add minpoll, precision, nocrossts options to hwtimestamp directive
- Add rawmeasurements option to log directive and modify measurements
option to log only valid measurements from synchronised sources
- Allow sub-second polling interval with NTP sources
- Bug fixes
- Fix time smoothing in interleaved mode
Upgraded to version 3.0:
- Enhancements
- Add support for software and hardware timestamping on Linux
- Add support for client/server and symmetric interleaved modes
- Add support for MS-SNTP authentication in Samba
- Add support for truncated MACs in NTPv4 packets
- Estimate and correct for asymmetric network jitter
- Increase default minsamples and polltarget to improve stability with
very low jitter
- Add maxjitter directive to limit source selection by jitter
- Add offset option to server/pool/peer directive
- Add maxlockage option to refclock directive
- Add -t option to chronyd to exit after specified time
- Add partial protection against replay attacks on symmetric mode
- Don't reset polling interval when switching sources to online state
- Allow rate limiting with very short intervals
- Improve maximum server throughput on Linux and NetBSD
- Remove dump files after start
- Add tab-completion to chronyc with libedit/readline
- Add ntpdata command to print details about NTP measurements
- Allow all source options to be set in add server/peer command
- Indicate truncated addresses/hostnames in chronyc output
- Print reference IDs as hexadecimal numbers to avoid confusion with
IPv4 addresses
- Bug fixes
- Fix crash with disabled asynchronous name resolving
Upgraded to version 2.4.1:
- Bug fixes
- Fix processing of kernel timestamps on non-Linux systems
- Fix crash with smoothtime directive
- Fix validation of refclock sample times
- Fix parsing of refclock directive
update to 2.4:
- Enhancements
- Add orphan option to local directive for orphan mode compatible with
ntpd
- Add distance option to local directive to set activation threshold (1
second by default)
- Add maxdrift directive to set maximum allowed drift of system clock
- Try to replace NTP sources exceeding maximum distance
- Randomise source replacement to avoid getting stuck with bad sources
- Randomise selection of sources from pools on start
- Ignore reference timestamp as ntpd doesn't always set it correctly
- Modify tracking report to use same values as seen by NTP clients
- Add -c option to chronyc to write reports in CSV format
- Provide detailed manual pages
- Bug fixes
- Fix SOCK refclock to work correctly when not specified as last refclock
- Fix initstepslew and -q/-Q options to accept time from own NTP clients
- Fix authentication with keys using 512-bit hash functions
- Fix crash on exit when multiple signals are received
- Fix conversion of very small floating-point numbers in command packets
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE OpenStack Cloud Crowbar 9:
zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2021-4147=1
- SUSE OpenStack Cloud Crowbar 8:
zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2021-4147=1
- SUSE OpenStack Cloud 9:
zypper in -t patch SUSE-OpenStack-Cloud-9-2021-4147=1
- SUSE OpenStack Cloud 8:
zypper in -t patch SUSE-OpenStack-Cloud-8-2021-4147=1
- SUSE Linux Enterprise Server for SAP 12-SP4:
zypper in -t patch SUSE-SLE-SAP-12-SP4-2021-4147=1
- SUSE Linux Enterprise Server for SAP 12-SP3:
zypper in -t patch SUSE-SLE-SAP-12-SP3-2021-4147=1
- SUSE Linux Enterprise Server 12-SP5:
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2021-4147=1
- SUSE Linux Enterprise Server 12-SP4-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2021-4147=1
- SUSE Linux Enterprise Server 12-SP3-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-2021-4147=1
- SUSE Linux Enterprise Server 12-SP3-BCL:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2021-4147=1
- SUSE Linux Enterprise Server 12-SP2-BCL:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2021-4147=1
- HPE Helion Openstack 8:
zypper in -t patch HPE-Helion-OpenStack-8-2021-4147=1
Package List:
- SUSE OpenStack Cloud Crowbar 9 (x86_64):
chrony-4.1-5.9.1
chrony-debuginfo-4.1-5.9.1
chrony-debugsource-4.1-5.9.1
- SUSE OpenStack Cloud Crowbar 8 (x86_64):
chrony-4.1-5.9.1
chrony-debuginfo-4.1-5.9.1
chrony-debugsource-4.1-5.9.1
- SUSE OpenStack Cloud 9 (x86_64):
chrony-4.1-5.9.1
chrony-debuginfo-4.1-5.9.1
chrony-debugsource-4.1-5.9.1
- SUSE OpenStack Cloud 8 (x86_64):
chrony-4.1-5.9.1
chrony-debuginfo-4.1-5.9.1
chrony-debugsource-4.1-5.9.1
- SUSE Linux Enterprise Server for SAP 12-SP4 (ppc64le x86_64):
chrony-4.1-5.9.1
chrony-debuginfo-4.1-5.9.1
chrony-debugsource-4.1-5.9.1
- SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64):
chrony-4.1-5.9.1
chrony-debuginfo-4.1-5.9.1
chrony-debugsource-4.1-5.9.1
- SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):
chrony-4.1-5.9.1
chrony-debuginfo-4.1-5.9.1
chrony-debugsource-4.1-5.9.1
- SUSE Linux Enterprise Server 12-SP4-LTSS (aarch64 ppc64le s390x x86_64):
chrony-4.1-5.9.1
chrony-debuginfo-4.1-5.9.1
chrony-debugsource-4.1-5.9.1
- SUSE Linux Enterprise Server 12-SP3-LTSS (aarch64 ppc64le s390x x86_64):
chrony-4.1-5.9.1
chrony-debuginfo-4.1-5.9.1
chrony-debugsource-4.1-5.9.1
- SUSE Linux Enterprise Server 12-SP3-BCL (x86_64):
chrony-4.1-5.9.1
chrony-debuginfo-4.1-5.9.1
chrony-debugsource-4.1-5.9.1
- SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):
chrony-4.1-5.9.1
chrony-debuginfo-4.1-5.9.1
chrony-debugsource-4.1-5.9.1
- HPE Helion Openstack 8 (x86_64):
chrony-4.1-5.9.1
chrony-debuginfo-4.1-5.9.1
chrony-debugsource-4.1-5.9.1
References:
https://www.suse.com/security/cve/CVE-2020-14367.html
https://bugzilla.suse.com/1063704
https://bugzilla.suse.com/1069468
https://bugzilla.suse.com/1082318
https://bugzilla.suse.com/1083597
https://bugzilla.suse.com/1099272
https://bugzilla.suse.com/1115529
https://bugzilla.suse.com/1128846
https://bugzilla.suse.com/1156884
https://bugzilla.suse.com/1159840
https://bugzilla.suse.com/1161119
https://bugzilla.suse.com/1162964
https://bugzilla.suse.com/1171806
https://bugzilla.suse.com/1172113
https://bugzilla.suse.com/1173277
https://bugzilla.suse.com/1173760
https://bugzilla.suse.com/1174075
https://bugzilla.suse.com/1174911
https://bugzilla.suse.com/1180689
https://bugzilla.suse.com/1181826
https://bugzilla.suse.com/1183783
https://bugzilla.suse.com/1184400
https://bugzilla.suse.com/1187906
https://bugzilla.suse.com/1190926
More information about the sle-security-updates
mailing list