Security update for ntp

ntp was updated to version 4.2.8p6 to fix 12 security issues.

Also yast2-ntp-client was updated to match some sntp syntax changes. (bsc#937837)

These security issues were fixed:
- CVE-2015-8158: Fixed potential infinite loop in ntpq (bsc#962966).
- CVE-2015-8138: Zero Origin Timestamp Bypass (bsc#963002).
- CVE-2015-7979: Off-path Denial of Service (DoS) attack on authenticated broadcast mode (bsc#962784).
- CVE-2015-7978: Stack exhaustion in recursive traversal of restriction list (bsc#963000).
- CVE-2015-7977: reslist NULL pointer dereference (bsc#962970).
- CVE-2015-7976: ntpq saveconfig command allows dangerous characters in filenames (bsc#962802).
- CVE-2015-7975: nextvar() missing length check (bsc#962988).
- CVE-2015-7974: Skeleton Key: Missing key check allows impersonation between authenticated peers (bsc#962960).
- CVE-2015-7973: Replay attack on authenticated broadcast mode (bsc#962995).
- CVE-2015-8140: ntpq vulnerable to replay attacks (bsc#962994).
- CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin (bsc#962997).
- CVE-2015-5300: MITM attacker could have forced ntpd to make a step larger than the panic threshold (bsc#951629).

These non-security issues were fixed:
- fate#320758 bsc#975981: Enable compile-time support for MS-SNTP
(--enable-ntp-signd). This replaces the w32 patches in 4.2.4 that added
the authreg directive.
- bsc#962318: Call /usr/sbin/sntp with full path to synchronize in start-ntpd.
When run as cron job, /usr/sbin/ is not in the path, which caused
the synchronization to fail.
- bsc#782060: Speedup ntpq.
- bsc#916617: Add /var/db/ntp-kod.
- bsc#956773: Add ntp-ENOBUFS.patch to limit a warning that might happen quite a lot on loaded systems.
- bsc#951559,bsc#975496: Fix the TZ offset output of sntp during DST.
- Add ntp-fork.patch and build with threads disabled to allow name resolution even when running chrooted.

This update was imported from the SUSE:SLE-12-SP1:Update update project.

Fixed bugs
bnc#962988
VUL-1: CVE-2015-7975: ntp: nextvar() missing length check in ntpq
bnc#962995
VUL-0: CVE-2015-7973: ntp,xntp: replay attack on authenticated broadcast mode
bnc#951559
sntp prints wrong offset to UTC during DST
bnc#962970
VUL-0: CVE-2015-7977: ntp,xntp: restriction list NULL pointer dereference
bnc#962960
VUL-1: CVE-2015-7974: ntp,xntp: Missing key check allows impersonation between authenticated peers
bnc#962802
VUL-1: CVE-2015-7976: ntp,xntp: 'ntpq saveconfig' command allows dangerous characters in filenames
bnc#962966
VUL-1: CVE-2015-8158: ntp,xntp: potential infinite loop in ntpq
bnc#962784
VUL-0: CVE-2015-7979: ntp,xntp: off-path denial of service on authenticated broadcast mode
bnc#916617
sntp command line syntax has changed
bnc#963002
VUL-0: CVE-2015-8138: ntp, xntp: Zero Origin Timestamp Bypass
bnc#951629
VUL-0: CVE-2015-5300: ntp: MITM attacker can force ntpd to make a step larger than the panic threshold
bnc#963000
VUL-0: CVE-2015-7978: ntp, xntp: Stack exhaustion in recursive traversal of restriction list
bnc#956773
ntp: routing socket reports: No buffer space available
bnc#962994
VUL-0: CVE-2015-8140: ntp,xntp: ntpq protocol vulnerable to replay attacks
bnc#962997
VUL-1: CVE-2015-8139: ntp, xntp: Disclose Origin Timestamp to Unauthenticated Clients
bnc#975496
sntp prints invalid datestr
bnc#782060
ntpq is very slow
bnc#962318
NTP client doesn`t work in "synchronize without daemon" mode
bnc#975981
[TRACKERBUG] FATE#320758: Enable MSSNTP in ntp package
bnc#937837
sntp command line syntax has changed
Selected Binaries
openSUSE Build Service is sponsored by