Overview

Request 396591 accepted

This fix needs to be released together with the respective adjustments
in YaST (boo#979421) and sysconfig/wicked (bsc#894889).

- Update to 4.2.8p7 (bsc#977446):
* CVE-2016-1547, bsc#977459:
Validate crypto-NAKs, AKA: CRYPTO-NAK DoS.
* CVE-2016-1548, bsc#977461: Interleave-pivot
* CVE-2016-1549, bsc#977451:
Sybil vulnerability: ephemeral association attack.
* CVE-2016-1550, bsc#977464: Improve NTP security against buffer
comparison timing attacks.
* CVE-2016-1551, bsc#977450:
Refclock impersonation vulnerability
* CVE-2016-2516, bsc#977452: Duplicate IPs on unconfig
directives will cause an assertion botch in ntpd.
* CVE-2016-2517, bsc#977455: remote configuration trustedkey/
requestkey/controlkey values are not properly validated.
* CVE-2016-2518, bsc#977457: Crafted addpeer with hmode > 7
causes array wraparound with MATCH_ASSOC.
* CVE-2016-2519, bsc#977458: ctl_getitem() return value not
always checked.
* integrate ntp-fork.patch
* Improve the fixes for:
CVE-2015-7704, CVE-2015-7705, CVE-2015-7974
- Restrict the parser in the startup script to the first
occurrance of "keys" and "controlkey" in ntp.conf (boo#957226).

- Enable compile-time support for MS-SNTP (--enable-ntp-signd).
This replaces the w32 patches in 4.2.4 that added the authreg
directive. (fate#320758).
- Fix ntp-sntp-dst.patch (bsc#975496).
- Call /usr/sbin/sntp with full path to synchronize in start-ntpd.
When run as cron job, /usr/sbin/ is not in the path, which caused
the synchronization to fail. (boo#962318)
- Speedup ntpq (boo#782060, ntp-speedup-ntpq.patch).
- Sync service files with openSUSE Factory.

- Fix the TZ offset output of sntp during DST (bsc#951559).

- Add ntp-fork.patch and build with threads disabled to allow
name resolution even when running chrooted.

- Update to 4.2.8p6:
* CVE-2015-8158, bsc#962966: Potential Infinite Loop in ntpq.
* CVE-2015-8138, bsc#963002: origin: Zero Origin Timestamp
Bypass.
* CVE-2015-7979, bsc#962784: Off-path Denial of Service (DoS)
attack on authenticated broadcast mode.
* CVE-2015-7978, bsc#963000: Stack exhaustion in recursive
traversal of restriction list.
* CVE-2015-7977, bsc#962970: reslist NULL pointer dereference.
* CVE-2015-7976, bsc#962802: ntpq saveconfig command allows
dangerous characters in filenames.
* CVE-2015-7975, bsc#962988: nextvar() missing length check.
* CVE-2015-7974, bsc#962960: Skeleton Key: Missing key check
allows impersonation between authenticated peers.
* CVE-2015-7973, bsc#962995: Deja Vu: Replay attack on
authenticated broadcast mode.
* CVE-2015-8140: ntpq vulnerable to replay attacks.
* CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin.
* CVE-2015-5300, bsc#951629: Small-step/Big-step.

Request History
Reinhard Max's avatar

rmax created request

This fix needs to be released together with the respective adjustments
in YaST (boo#979421) and sysconfig/wicked (bsc#894889).

- Update to 4.2.8p7 (bsc#977446):
* CVE-2016-1547, bsc#977459:
Validate crypto-NAKs, AKA: CRYPTO-NAK DoS.
* CVE-2016-1548, bsc#977461: Interleave-pivot
* CVE-2016-1549, bsc#977451:
Sybil vulnerability: ephemeral association attack.
* CVE-2016-1550, bsc#977464: Improve NTP security against buffer
comparison timing attacks.
* CVE-2016-1551, bsc#977450:
Refclock impersonation vulnerability
* CVE-2016-2516, bsc#977452: Duplicate IPs on unconfig
directives will cause an assertion botch in ntpd.
* CVE-2016-2517, bsc#977455: remote configuration trustedkey/
requestkey/controlkey values are not properly validated.
* CVE-2016-2518, bsc#977457: Crafted addpeer with hmode > 7
causes array wraparound with MATCH_ASSOC.
* CVE-2016-2519, bsc#977458: ctl_getitem() return value not
always checked.
* integrate ntp-fork.patch
* Improve the fixes for:
CVE-2015-7704, CVE-2015-7705, CVE-2015-7974
- Restrict the parser in the startup script to the first
occurrance of "keys" and "controlkey" in ntp.conf (boo#957226).

- Enable compile-time support for MS-SNTP (--enable-ntp-signd).
This replaces the w32 patches in 4.2.4 that added the authreg
directive. (fate#320758).
- Fix ntp-sntp-dst.patch (bsc#975496).
- Call /usr/sbin/sntp with full path to synchronize in start-ntpd.
When run as cron job, /usr/sbin/ is not in the path, which caused
the synchronization to fail. (boo#962318)
- Speedup ntpq (boo#782060, ntp-speedup-ntpq.patch).
- Sync service files with openSUSE Factory.

- Fix the TZ offset output of sntp during DST (bsc#951559).

- Add ntp-fork.patch and build with threads disabled to allow
name resolution even when running chrooted.

- Update to 4.2.8p6:
* CVE-2015-8158, bsc#962966: Potential Infinite Loop in ntpq.
* CVE-2015-8138, bsc#963002: origin: Zero Origin Timestamp
Bypass.
* CVE-2015-7979, bsc#962784: Off-path Denial of Service (DoS)
attack on authenticated broadcast mode.
* CVE-2015-7978, bsc#963000: Stack exhaustion in recursive
traversal of restriction list.
* CVE-2015-7977, bsc#962970: reslist NULL pointer dereference.
* CVE-2015-7976, bsc#962802: ntpq saveconfig command allows
dangerous characters in filenames.
* CVE-2015-7975, bsc#962988: nextvar() missing length check.
* CVE-2015-7974, bsc#962960: Skeleton Key: Missing key check
allows impersonation between authenticated peers.
* CVE-2015-7973, bsc#962995: Deja Vu: Replay attack on
authenticated broadcast mode.
* CVE-2015-8140: ntpq vulnerable to replay attacks.
* CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin.
* CVE-2015-5300, bsc#951629: Small-step/Big-step.


Maintenance Bot's avatar

maintbot accepted review

accepted


Maintenance Bot's avatar

maintbot approved review

accepted


Sebastian Krahmer's avatar

krahmer moved maintenance target to openSUSE:Maintenance:5100


Sebastian Krahmer's avatar

krahmer accepted request

ok

openSUSE Build Service is sponsored by