Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2016:1602-1

Опубликовано: 17 июн. 2016
Источник: suse-cvrf

Описание

Security update for ntp

ntp was updated to version 4.2.8p8 to fix five security issues.

These security issues were fixed:

  • CVE-2016-4953: Bad authentication demobilizes ephemeral associations (bsc#982065).
  • CVE-2016-4954: Processing spoofed server packets (bsc#982066).
  • CVE-2016-4955: Autokey association reset (bsc#982067).
  • CVE-2016-4956: Broadcast interleave (bsc#982068).
  • CVE-2016-4957: CRYPTO_NAK crash (bsc#982064).

These non-security issues were fixed:

  • Keep the parent process alive until the daemon has finished initialisation, to make sure that the PID file exists when the parent returns.
  • bsc#979302: Change the process name of the forking DNS worker process to avoid the impression that ntpd is started twice.
  • bsc#981422: Don't ignore SIGCHILD because it breaks wait().

Список пакетов

SUSE Linux Enterprise Server 11 SP2-LTSS
ntp-4.2.8p8-47.3
ntp-doc-4.2.8p8-47.3
SUSE Linux Enterprise Server 11 SP3-LTSS
ntp-4.2.8p8-47.3
ntp-doc-4.2.8p8-47.3
SUSE Linux Enterprise Server 11 SP3-TERADATA
ntp-4.2.8p8-47.3
ntp-doc-4.2.8p8-47.3
SUSE Manager 2.1
ntp-4.2.8p8-47.3
ntp-doc-4.2.8p8-47.3
SUSE Manager Proxy 2.1
ntp-4.2.8p8-47.3
ntp-doc-4.2.8p8-47.3
SUSE OpenStack Cloud 5
ntp-4.2.8p8-47.3
ntp-doc-4.2.8p8-47.3

Описание

ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (ephemeral-association demobilization) by sending a spoofed crypto-NAK packet with incorrect authentication data at a certain time.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p8-47.3
SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p8-47.3
SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p8-47.3
SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p8-47.3

Ссылки

Описание

The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p8-47.3
SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p8-47.3
SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p8-47.3
SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p8-47.3

Ссылки

Описание

ntpd in NTP 4.x before 4.2.8p8, when autokey is enabled, allows remote attackers to cause a denial of service (peer-variable clearing and association outage) by sending (1) a spoofed crypto-NAK packet or (2) a packet with an incorrect MAC value at a certain time.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p8-47.3
SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p8-47.3
SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p8-47.3
SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p8-47.3

Ссылки

Описание

ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (interleaved-mode transition and time change) via a spoofed broadcast packet. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-1548.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p8-47.3
SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p8-47.3
SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p8-47.3
SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p8-47.3

Ссылки

Описание

ntpd in NTP before 4.2.8p8 allows remote attackers to cause a denial of service (daemon crash) via a crypto-NAK packet. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-1547.


Затронутые продукты
SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p8-47.3
SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p8-47.3
SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p8-47.3
SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p8-47.3

Ссылки
Уязвимость SUSE-SU-2016:1602-1