Bugzilla – Bug 1210389
VUL-0: CVE-2023-26554: ntp: ntpq: out-of-bounds write when adding a '\0' character
Last modified: 2023-05-11 08:30:03 UTC
CVE-2023-26554 mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a '\0' character. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26554 https://www.cve.org/CVERecord?id=CVE-2023-26554 https://github.com/spwpun/ntp-4.2.8p15-cves/blob/main/CVE-2023-26554
https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1#issuecomment-1506542825 > I agree with @rma-x that (beside the palisade driver) the CVEs only affect ntpq, not ntpd. The CVSS score was changed to 4.4.
This issue is now treated as a duplicate of CVE-2023-26551. The main issue comes down to input validation of ntpq that has then effect at multiple code locations. *** This bug has been marked as a duplicate of bug 1210386 ***
SUSE-SU-2023:2142-1: An update that solves four vulnerabilities can now be installed. Category: security (moderate) Bug References: 1210386, 1210387, 1210388, 1210389 CVE References: CVE-2023-26551, CVE-2023-26552, CVE-2023-26553, CVE-2023-26554 Sources used: openSUSE Leap 15.4 (src): ntp-4.2.8p15-150000.4.22.1 Legacy Module 15-SP4 (src): ntp-4.2.8p15-150000.4.22.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2171-1: An update that solves four vulnerabilities can now be installed. Category: security (moderate) Bug References: 1210386, 1210387, 1210388, 1210389 CVE References: CVE-2023-26551, CVE-2023-26552, CVE-2023-26553, CVE-2023-26554 Sources used: SUSE Linux Enterprise High Performance Computing 12 SP5 (src): ntp-4.2.8p15-100.1 SUSE Linux Enterprise Server 12 SP5 (src): ntp-4.2.8p15-100.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): ntp-4.2.8p15-100.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.