[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2016:1563-1 -- Suse ntp

ID: oval:org.secpod.oval:def:400712Date: (C)2016-11-22   (M)2024-01-29
Class: PATCHFamily: unix




ntp was updated to version 4.2.8p8 to fix five security issues. These security issues were fixed: - CVE-2016-4953: Bad authentication demobilizes ephemeral associations . - CVE-2016-4954: Processing spoofed server packets . - CVE-2016-4955: Autokey association reset . - CVE-2016-4956: Broadcast interleave . - CVE-2016-4957: CRYPTO_NAK crash . These non-security issues were fixed: - Keep the parent process alive until the daemon has finished initialisation, to make sure that the PID file exists when the parent returns. - bsc#979302: Change the process name of the forking DNS worker process to avoid the impression that ntpd is started twice. - bsc#981422: Don"t ignore SIGCHILD because it breaks wait. - bsc#979981: ntp-wait does not accept fractional seconds, so use 1 instead of 0.2 in ntp-wait.service. - Separate the creation of ntp.keys and key #1 in it to avoid problems when upgrading installations that have the file, but no key #1, which is needed e.g. by "rcntp addserver".

Platform:
SUSE Linux Enterprise Server 12 SP1
SUSE Linux Enterprise Desktop 12 SP1
Product:
ntp
Reference:
SUSE-SU-2016:1563-1
CVE-2016-4953
CVE-2016-4954
CVE-2016-4955
CVE-2016-4956
CVE-2016-4957
CVE    5
CVE-2016-4956
CVE-2016-4955
CVE-2016-4957
CVE-2016-4954
...
CPE    711
cpe:/a:ntp:ntp:4.2.5:p239_rc1
cpe:/a:ntp:ntp:4.2.5:p247_rc1
cpe:/a:ntp:ntp:4.2.7:p159
cpe:/a:ntp:ntp:4.2.7:p157
...

© SecPod Technologies