Security update for ntp
This update for ntp fixes the following issues:
Security issue fixed:
- CVE-2019-8936: Fixed a null pointer exception which could allow an authenticated attcker to cause
segmentation fault to ntpd (bsc#1128525).
Other isses addressed:
- Fixed an issue which caused openSSL mismatch (bsc#1125401)
- Fixed several bugs in the BANCOMM reclock driver.
- Fixed ntp_loopfilter.c snprintf compilation warnings.
- Fixed spurious initgroups() error message.
- Fixed STA_NANO struct timex units.
- Fixed GPS week rollover in libparse.
- Fixed incorrect poll interval in packet.
- Added a missing check for ENABLE_CMAC.
This update was imported from the SUSE:SLE-12-SP1:Update update project.
- Submitted by Reinhard Max (rmax)
Fixed bugs
bnc#1128525
VUL-0: CVE-2019-8936: ntp: ntp: Crafted null dereference attack in authenticated mode 6 packet
bnc#1125401
ntpd[2106]: OpenSSL version mismatch. Built against 1000109f, you have 1000210f