File _patchinfo of Package patchinfo.9479
<patchinfo incident="9479"> <issue tracker="bnc" id="1122131">VUL-1: CVE-2019-6445: ntpsec: An authenticated attacker can cause a NULL pointer dereference and ntpd crash</issue> <issue tracker="bnc" id="1122132">VUL-1: CVE-2019-6442: ntpsec: An authenticated attacker can write one byte out of bounds in ntpd via a malformed config request</issue> <issue tracker="bnc" id="1122144">VUL-1: CVE-2019-6443: ntpsec: A stack-based buffer over-read discovered in read_sysvars in ntp_control.c in ntpd</issue> <issue tracker="bnc" id="1122134">VUL-1: CVE-2019-6444: ntpsec: A stack-based over-read was found due to attacker's-controlled data is dereferenced by ntohl() in ntpd</issue> <issue tracker="cve" id="2019-6442"/> <issue tracker="cve" id="2019-6443"/> <issue tracker="cve" id="2019-6444"/> <issue tracker="cve" id="2019-6445"/> <category>security</category> <rating>important</rating> <packager>scarabeus_iv</packager> <description>This update for ntpsec to version 1.1.3 fixes the following issues: Security issues fixed: - CVE-2019-6442: Fixed a out of bounds write via a malformed config request (boo#1122132) - CVE-2019-6443: Fixed a stack-based buffer over-read in the ctl_getitem function (boo#1122144) - CVE-2019-6444: Fixed a stack-based buffer over-read in the process_control function (boo#1122134) - CVE-2019-6445: Fixed a NULL pointer dereference in the ctl_getitem function (boo#1122131) </description> <summary>Security update for ntpsec</summary> </patchinfo>