[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

95906

 
 

909

 
 

77986

 
 

109

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2016:1563-1 -- Suse ntp

ID: oval:org.secpod.oval:def:400712Date: (C)2016-11-22   (M)2017-10-12
Class: PATCHFamily: unix




ntp was updated to version 4.2.8p8 to fix five security issues. These security issues were fixed: - CVE-2016-4953: Bad authentication demobilizes ephemeral associations . - CVE-2016-4954: Processing spoofed server packets . - CVE-2016-4955: Autokey association reset . - CVE-2016-4956: Broadcast interleave . - CVE-2016-4957: CRYPTO_NAK crash . These non-security issues were fixed: - Keep the parent process alive until the daemon has finished initialisation, to make sure that the PID file exists when the parent returns. - bsc#979302: Change the process name of the forking DNS worker process to avoid the impression that ntpd is started twice. - bsc#981422: Don"t ignore SIGCHILD because it breaks wait. - bsc#979981: ntp-wait does not accept fractional seconds, so use 1 instead of 0.2 in ntp-wait.service. - Separate the creation of ntp.keys and key #1 in it to avoid problems when upgrading installations that have the file, but no key #1, which is needed e.g. by "rcntp addserver".

Platform:
SUSE Linux Enterprise Server 12 SP1
SUSE Linux Enterprise Desktop 12 SP1
Product:
ntp
Reference:
SUSE-SU-2016:1563-1
CVE-2016-4953
CVE-2016-4954
CVE-2016-4955
CVE-2016-4956
CVE-2016-4957
CVE    5
CVE-2016-4956
CVE-2016-4955
CVE-2016-4957
CVE-2016-4954
...
CPE    712
cpe:/a:ntp:ntp
cpe:/o:novell:leap:42.1
cpe:/o:novell:opensuse:13.2
cpe:/a:ntp:ntp:4.1.0
...

© 2013 SecPod Technologies