Описание
Security update for ntp
This update for ntp fixes the following issues:
Security issue fixed:
- CVE-2019-8936: Fixed a null pointer exception which could allow an authenticated attcker to cause segmentation fault to ntpd (bsc#1128525).
Other isses addressed:
- Fixed an issue which caused openSSL mismatch (bsc#1125401)
- Fixed several bugs in the BANCOMM reclock driver.
- Fixed ntp_loopfilter.c snprintf compilation warnings.
- Fixed spurious initgroups() error message.
- Fixed STA_NANO struct timex units.
- Fixed GPS week rollover in libparse.
- Fixed incorrect poll interval in packet.
- Added a missing check for ENABLE_CMAC.
Список пакетов
Image SLES12-SP5-Azure-BYOS
ntp-4.2.8p13-85.1
Image SLES12-SP5-Azure-Basic-On-Demand
ntp-4.2.8p13-85.1
Image SLES12-SP5-Azure-HPC-BYOS
ntp-4.2.8p13-85.1
Image SLES12-SP5-Azure-HPC-On-Demand
ntp-4.2.8p13-85.1
Image SLES12-SP5-Azure-SAP-BYOS
ntp-4.2.8p13-85.1
Image SLES12-SP5-Azure-SAP-On-Demand
ntp-4.2.8p13-85.1
Image SLES12-SP5-Azure-Standard-On-Demand
ntp-4.2.8p13-85.1
Image SLES12-SP5-EC2-BYOS
ntp-4.2.8p13-85.1
Image SLES12-SP5-EC2-ECS-On-Demand
ntp-4.2.8p13-85.1
Image SLES12-SP5-EC2-On-Demand
ntp-4.2.8p13-85.1
Image SLES12-SP5-EC2-SAP-BYOS
ntp-4.2.8p13-85.1
Image SLES12-SP5-EC2-SAP-On-Demand
ntp-4.2.8p13-85.1
Image SLES12-SP5-GCE-BYOS
ntp-4.2.8p13-85.1
Image SLES12-SP5-GCE-On-Demand
ntp-4.2.8p13-85.1
Image SLES12-SP5-GCE-SAP-BYOS
ntp-4.2.8p13-85.1
Image SLES12-SP5-GCE-SAP-On-Demand
ntp-4.2.8p13-85.1
Image SLES12-SP5-OCI-BYOS-BYOS
ntp-4.2.8p13-85.1
Image SLES12-SP5-OCI-BYOS-SAP-BYOS
ntp-4.2.8p13-85.1
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
ntp-4.2.8p13-85.1
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production
ntp-4.2.8p13-85.1
SUSE Enterprise Storage 4
ntp-4.2.8p13-85.1
ntp-doc-4.2.8p13-85.1
SUSE Linux Enterprise Desktop 12 SP3
ntp-4.2.8p13-85.1
ntp-doc-4.2.8p13-85.1
SUSE Linux Enterprise Desktop 12 SP4
ntp-4.2.8p13-85.1
ntp-doc-4.2.8p13-85.1
SUSE Linux Enterprise Server 12 SP1-LTSS
ntp-4.2.8p13-85.1
ntp-doc-4.2.8p13-85.1
SUSE Linux Enterprise Server 12 SP2-BCL
ntp-4.2.8p13-85.1
ntp-doc-4.2.8p13-85.1
SUSE Linux Enterprise Server 12 SP2-LTSS
ntp-4.2.8p13-85.1
ntp-doc-4.2.8p13-85.1
SUSE Linux Enterprise Server 12 SP3
ntp-4.2.8p13-85.1
ntp-doc-4.2.8p13-85.1
SUSE Linux Enterprise Server 12 SP4
ntp-4.2.8p13-85.1
ntp-doc-4.2.8p13-85.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1
ntp-4.2.8p13-85.1
ntp-doc-4.2.8p13-85.1
SUSE Linux Enterprise Server for SAP Applications 12 SP2
ntp-4.2.8p13-85.1
ntp-doc-4.2.8p13-85.1
SUSE Linux Enterprise Server for SAP Applications 12 SP3
ntp-4.2.8p13-85.1
ntp-doc-4.2.8p13-85.1
SUSE Linux Enterprise Server for SAP Applications 12 SP4
ntp-4.2.8p13-85.1
ntp-doc-4.2.8p13-85.1
SUSE OpenStack Cloud 7
ntp-4.2.8p13-85.1
ntp-doc-4.2.8p13-85.1
Ссылки
- Link for SUSE-SU-2019:0789-1
- E-Mail link for SUSE-SU-2019:0789-1
- SUSE Security Ratings
- SUSE Bug 1125401
- SUSE Bug 1128525
- SUSE CVE CVE-2019-8936 page
Описание
NTP through 4.2.8p12 has a NULL Pointer Dereference.
Затронутые продукты
Image SLES12-SP5-Azure-BYOS:ntp-4.2.8p13-85.1
Image SLES12-SP5-Azure-Basic-On-Demand:ntp-4.2.8p13-85.1
Image SLES12-SP5-Azure-HPC-BYOS:ntp-4.2.8p13-85.1
Image SLES12-SP5-Azure-HPC-On-Demand:ntp-4.2.8p13-85.1
Ссылки
- CVE-2019-8936
- SUSE Bug 1128525
- SUSE Bug 1148892
- SUSE Bug 1155513