Bugzilla – Bug 943218
VUL-1: CVE-2015-5194: ntp: crash with crafted logconfig configuration command
Last modified: 2019-05-01 16:51:36 UTC
Quoting from oss-sec: "It was found that ntpd could crash due to an uninitialized variable when processing malformed logconfig configuration commands, for example: ntpq -c ":config logconfig a" Upstream fix: http://bk1.ntp.org/ntp-dev/?PAGE=patch&REV=4c4fc141LwvcoGp-lLGhkAFp3ZvtrA https://github.com/ntp-project/ntp/commit/553f2fa65865c31c5e3c48812cfd46176cffdd27 " rh#1254542 References: https://bugzilla.redhat.com/show_bug.cgi?id=1254542 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5194 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194
bugbot adjusting priority
4.2.4 is good, 4.2.6, 4.2.8 is affected. Affects SLE 11 SP4 and SLE 12 and openSUSE. Planned update for SLE.
An update workflow for this issue was started. This issue was rated as "moderate". Please submit fixed packages until "Jan. 14, 2016". When done, reassign the bug to "security-team@suse.de". /update/121227/.
SUSE-SU-2016:1311-1: An update that solves 30 vulnerabilities and has 6 fixes is now available. Category: security (important) Bug References: 782060,784760,905885,910063,916617,920183,920238,926510,936327,937837,942441,942587,943216,943218,944300,946386,951351,951559,951608,951629,954982,956773,962318,962784,962802,962960,962966,962970,962988,962994,962995,962997,963000,963002,975496,975981 CVE References: CVE-2015-5194,CVE-2015-5219,CVE-2015-5300,CVE-2015-7691,CVE-2015-7692,CVE-2015-7701,CVE-2015-7702,CVE-2015-7703,CVE-2015-7704,CVE-2015-7705,CVE-2015-7848,CVE-2015-7849,CVE-2015-7850,CVE-2015-7851,CVE-2015-7852,CVE-2015-7853,CVE-2015-7854,CVE-2015-7855,CVE-2015-7871,CVE-2015-7973,CVE-2015-7974,CVE-2015-7975,CVE-2015-7976,CVE-2015-7977,CVE-2015-7978,CVE-2015-7979,CVE-2015-8138,CVE-2015-8139,CVE-2015-8140,CVE-2015-8158 Sources used: SUSE OpenStack Cloud 5 (src): ntp-4.2.8p6-41.1 SUSE Manager Proxy 2.1 (src): ntp-4.2.8p6-41.1 SUSE Manager 2.1 (src): ntp-4.2.8p6-41.1 SUSE Linux Enterprise Server 11-SP3-LTSS (src): ntp-4.2.8p6-41.1 SUSE Linux Enterprise Server 11-SP2-LTSS (src): ntp-4.2.8p6-41.1, yast2-ntp-client-2.17.14.1-1.12.1 SUSE Linux Enterprise Debuginfo 11-SP3 (src): ntp-4.2.8p6-41.1 SUSE Linux Enterprise Debuginfo 11-SP2 (src): ntp-4.2.8p6-41.1
Upstream fix is from 2010, so 4.2.8 should not be affected.
An update workflow for this issue was started. This issue was rated as important. Please submit fixed packages until 2016-06-21. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/62822
SUSE-SU-2016:1912-1: An update that solves 43 vulnerabilities and has 9 fixes is now available. Category: security (important) Bug References: 782060,784760,905885,910063,916617,920183,920238,920893,920895,920905,924202,926510,936327,943218,943221,944300,951351,951559,951629,952611,957226,962318,962784,962802,962960,962966,962970,962988,962995,963000,963002,975496,977450,977451,977452,977455,977457,977458,977459,977461,977464,979302,981422,982056,982064,982065,982066,982067,982068,988417,988558,988565 CVE References: CVE-2015-1798,CVE-2015-1799,CVE-2015-5194,CVE-2015-5300,CVE-2015-7691,CVE-2015-7692,CVE-2015-7701,CVE-2015-7702,CVE-2015-7703,CVE-2015-7704,CVE-2015-7705,CVE-2015-7848,CVE-2015-7849,CVE-2015-7850,CVE-2015-7851,CVE-2015-7852,CVE-2015-7853,CVE-2015-7854,CVE-2015-7855,CVE-2015-7871,CVE-2015-7973,CVE-2015-7974,CVE-2015-7975,CVE-2015-7976,CVE-2015-7977,CVE-2015-7978,CVE-2015-7979,CVE-2015-8138,CVE-2015-8158,CVE-2016-1547,CVE-2016-1548,CVE-2016-1549,CVE-2016-1550,CVE-2016-1551,CVE-2016-2516,CVE-2016-2517,CVE-2016-2518,CVE-2016-2519,CVE-2016-4953,CVE-2016-4954,CVE-2016-4955,CVE-2016-4956,CVE-2016-4957 Sources used: SUSE Linux Enterprise Server 10 SP4 LTSS (src): ntp-4.2.8p8-0.7.1
all released