Security update for ntpsec

This update for ntpsec to version 1.1.3 fixes the following issues:

Security issues fixed:

- CVE-2019-6442: Fixed a out of bounds write via a malformed config request (boo#1122132)
- CVE-2019-6443: Fixed a stack-based buffer over-read in the ctl_getitem function (boo#1122144)
- CVE-2019-6444: Fixed a stack-based buffer over-read in the process_control function (boo#1122134)
- CVE-2019-6445: Fixed a NULL pointer dereference in the ctl_getitem function (boo#1122131)

Fixed bugs
bnc#1122131
VUL-1: CVE-2019-6445: ntpsec: An authenticated attacker can cause a NULL pointer dereference and ntpd crash
bnc#1122132
VUL-1: CVE-2019-6442: ntpsec: An authenticated attacker can write one byte out of bounds in ntpd via a malformed config request
bnc#1122144
VUL-1: CVE-2019-6443: ntpsec: A stack-based buffer over-read discovered in read_sysvars in ntp_control.c in ntpd
bnc#1122134
VUL-1: CVE-2019-6444: ntpsec: A stack-based over-read was found due to attacker's-controlled data is dereferenced by ntohl() in ntpd
Selected Binaries
openSUSE Build Service is sponsored by