Security update for ntp

This update for ntp fixes the following issues:

Security issue fixed:

- CVE-2019-8936: Fixed a null pointer exception which could allow an authenticated attcker to cause
segmentation fault to ntpd (bsc#1128525).

Other isses addressed:

- Fixed an issue which caused openSSL mismatch (bsc#1125401)
- Fixed several bugs in the BANCOMM reclock driver.
- Fixed ntp_loopfilter.c snprintf compilation warnings.
- Fixed spurious initgroups() error message.
- Fixed STA_NANO struct timex units.
- Fixed GPS week rollover in libparse.
- Fixed incorrect poll interval in packet.
- Added a missing check for ENABLE_CMAC.

This update was imported from the SUSE:SLE-12-SP1:Update update project.

Fixed bugs
bnc#1128525
VUL-0: CVE-2019-8936: ntp: ntp: Crafted null dereference attack in authenticated mode 6 packet
bnc#1125401
ntpd[2106]: OpenSSL version mismatch. Built against 1000109f, you have 1000210f
Selected Binaries
openSUSE Build Service is sponsored by