Описание
Security update for ntpsec
This update for ntpsec to version 1.1.3 fixes the following issues:
Security issues fixed:
- CVE-2019-6442: Fixed a out of bounds write via a malformed config request (boo#1122132)
- CVE-2019-6443: Fixed a stack-based buffer over-read in the ctl_getitem function (boo#1122144)
- CVE-2019-6444: Fixed a stack-based buffer over-read in the process_control function (boo#1122134)
- CVE-2019-6445: Fixed a NULL pointer dereference in the ctl_getitem function (boo#1122131)
Список пакетов
openSUSE Leap 15.0
Ссылки
- E-Mail link for openSUSE-SU-2019:0082-1
- SUSE Security Ratings
- SUSE Bug 1122131
- SUSE Bug 1122132
- SUSE Bug 1122134
- SUSE Bug 1122144
- SUSE CVE CVE-2019-6442 page
- SUSE CVE CVE-2019-6443 page
- SUSE CVE CVE-2019-6444 page
- SUSE CVE CVE-2019-6445 page
Описание
An issue was discovered in NTPsec before 1.1.3. An authenticated attacker can write one byte out of bounds in ntpd via a malformed config request, related to config_remotely in ntp_config.c, yyparse in ntp_parser.tab.c, and yyerror in ntp_parser.y.
Затронутые продукты
Ссылки
- CVE-2019-6442
- SUSE Bug 1122132
Описание
An issue was discovered in NTPsec before 1.1.3. Because of a bug in ctl_getitem, there is a stack-based buffer over-read in read_sysvars in ntp_control.c in ntpd.
Затронутые продукты
Ссылки
- CVE-2019-6443
- SUSE Bug 1122144
Описание
An issue was discovered in NTPsec before 1.1.3. process_control() in ntp_control.c has a stack-based buffer over-read because attacker-controlled data is dereferenced by ntohl() in ntpd.
Затронутые продукты
Ссылки
- CVE-2019-6444
- SUSE Bug 1122134
Описание
An issue was discovered in NTPsec before 1.1.3. An authenticated attacker can cause a NULL pointer dereference and ntpd crash in ntp_control.c, related to ctl_getitem.
Затронутые продукты
Ссылки
- CVE-2019-6445
- SUSE Bug 1122131