File _patchinfo of Package patchinfo.9479

<patchinfo incident="9479">
  <issue tracker="bnc" id="1122131">VUL-1: CVE-2019-6445: ntpsec: An authenticated attacker can cause a NULL pointer dereference and ntpd crash</issue>
  <issue tracker="bnc" id="1122132">VUL-1: CVE-2019-6442: ntpsec: An authenticated attacker can write one byte out of bounds in ntpd via a malformed config request</issue>
  <issue tracker="bnc" id="1122144">VUL-1: CVE-2019-6443: ntpsec: A stack-based buffer over-read discovered in read_sysvars in ntp_control.c in ntpd</issue>
  <issue tracker="bnc" id="1122134">VUL-1: CVE-2019-6444: ntpsec: A stack-based over-read was found due to  attacker's-controlled data is dereferenced by ntohl() in ntpd</issue>
  <issue tracker="cve" id="2019-6442"/>
  <issue tracker="cve" id="2019-6443"/>
  <issue tracker="cve" id="2019-6444"/>
  <issue tracker="cve" id="2019-6445"/>
  <category>security</category>
  <rating>important</rating>
  <packager>scarabeus_iv</packager>
  <description>This update for ntpsec to version 1.1.3 fixes the following issues:

Security issues fixed:

- CVE-2019-6442: Fixed a out of bounds write via a malformed config request (boo#1122132)
- CVE-2019-6443: Fixed a stack-based buffer over-read in the ctl_getitem function (boo#1122144)
- CVE-2019-6444: Fixed a stack-based buffer over-read in the process_control function (boo#1122134)
- CVE-2019-6445: Fixed a NULL pointer dereference in the ctl_getitem function (boo#1122131)
</description>
  <summary>Security update for ntpsec</summary>
</patchinfo>
openSUSE Build Service is sponsored by