[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

111017

 
 

909

 
 

86402

 
 

136

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2016:1563-1 -- Suse ntp

ID: oval:org.secpod.oval:def:400712Date: (C)2016-11-22   (M)2018-06-09
Class: PATCHFamily: unix




ntp was updated to version 4.2.8p8 to fix five security issues. These security issues were fixed: - CVE-2016-4953: Bad authentication demobilizes ephemeral associations . - CVE-2016-4954: Processing spoofed server packets . - CVE-2016-4955: Autokey association reset . - CVE-2016-4956: Broadcast interleave . - CVE-2016-4957: CRYPTO_NAK crash . These non-security issues were fixed: - Keep the parent process alive until the daemon has finished initialisation, to make sure that the PID file exists when the parent returns. - bsc#979302: Change the process name of the forking DNS worker process to avoid the impression that ntpd is started twice. - bsc#981422: Don"t ignore SIGCHILD because it breaks wait. - bsc#979981: ntp-wait does not accept fractional seconds, so use 1 instead of 0.2 in ntp-wait.service. - Separate the creation of ntp.keys and key #1 in it to avoid problems when upgrading installations that have the file, but no key #1, which is needed e.g. by "rcntp addserver".

Platform:
SUSE Linux Enterprise Server 12 SP1
SUSE Linux Enterprise Desktop 12 SP1
Product:
ntp
Reference:
SUSE-SU-2016:1563-1
CVE-2016-4953
CVE-2016-4954
CVE-2016-4955
CVE-2016-4956
CVE-2016-4957
CVE    5
CVE-2016-4956
CVE-2016-4955
CVE-2016-4957
CVE-2016-4954
...
CPE    709
cpe:/a:ntp:ntp:4.1.0
cpe:/a:ntp:ntp:4.1.2
cpe:/a:ntp:ntp:4.0.91
cpe:/a:ntp:ntp:4.0.92
...

© SecPod Technologies