Bugzilla – Bug 943216
VUL-1: CVE-2015-5219: ntp: infinite loop in sntp processing crafted packet
Last modified: 2019-05-01 16:51:25 UTC
Quoting from RH BZ: "It was discovered that sntp would hang in an infinite loop when a crafted NTP packet was received, related to the conversion of the precision value in the packet to double. Acknowledgements: This is issue was dicovered by Miroslav Lichvar of Red Hat." rh#1255118 References: https://bugzilla.redhat.com/show_bug.cgi?id=1255118 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5219 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219
bugbot adjusting priority
Upstream commit: http://bk1.ntp.org/ntp-dev/?PAGE=patch&REV=51786731Gr4-NOrTBC_a_uXO4wuGhg https://github.com/ntp-project/ntp/commit/5f295cd05c3c136d39f5b3e500a2d781bdbb59c8 All versions from SLE 11 SP1 up are affected. Planned update.
An update workflow for this issue was started. This issue was rated as "low". Please submit fixed packages until "Jan. 14, 2016". When done, reassign the bug to "security-team@suse.de". /update/121227/.
An update workflow for this issue was started. This issue was rated as "moderate". Please submit fixed packages until "Jan. 14, 2016". When done, reassign the bug to "security-team@suse.de". /update/121227/.
ntp bug 2382 is fixed in 4.2.8-p6
SUSE-SU-2016:1311-1: An update that solves 30 vulnerabilities and has 6 fixes is now available. Category: security (important) Bug References: 782060,784760,905885,910063,916617,920183,920238,926510,936327,937837,942441,942587,943216,943218,944300,946386,951351,951559,951608,951629,954982,956773,962318,962784,962802,962960,962966,962970,962988,962994,962995,962997,963000,963002,975496,975981 CVE References: CVE-2015-5194,CVE-2015-5219,CVE-2015-5300,CVE-2015-7691,CVE-2015-7692,CVE-2015-7701,CVE-2015-7702,CVE-2015-7703,CVE-2015-7704,CVE-2015-7705,CVE-2015-7848,CVE-2015-7849,CVE-2015-7850,CVE-2015-7851,CVE-2015-7852,CVE-2015-7853,CVE-2015-7854,CVE-2015-7855,CVE-2015-7871,CVE-2015-7973,CVE-2015-7974,CVE-2015-7975,CVE-2015-7976,CVE-2015-7977,CVE-2015-7978,CVE-2015-7979,CVE-2015-8138,CVE-2015-8139,CVE-2015-8140,CVE-2015-8158 Sources used: SUSE OpenStack Cloud 5 (src): ntp-4.2.8p6-41.1 SUSE Manager Proxy 2.1 (src): ntp-4.2.8p6-41.1 SUSE Manager 2.1 (src): ntp-4.2.8p6-41.1 SUSE Linux Enterprise Server 11-SP3-LTSS (src): ntp-4.2.8p6-41.1 SUSE Linux Enterprise Server 11-SP2-LTSS (src): ntp-4.2.8p6-41.1, yast2-ntp-client-2.17.14.1-1.12.1 SUSE Linux Enterprise Debuginfo 11-SP3 (src): ntp-4.2.8p6-41.1 SUSE Linux Enterprise Debuginfo 11-SP2 (src): ntp-4.2.8p6-41.1
all released
An update workflow for this issue was started. This issue was rated as moderate. Please submit fixed packages until 2016-12-08. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/63222
SUSE-SU-2016:3193-1: An update that solves 12 vulnerabilities and has three fixes is now available. Category: security (moderate) Bug References: 1009434,1011377,1011390,1011395,1011398,1011404,1011406,1011411,1011417,943216,956365,981252,988028,992038,992606 CVE References: CVE-2015-5219,CVE-2015-8139,CVE-2015-8140,CVE-2016-7426,CVE-2016-7427,CVE-2016-7428,CVE-2016-7429,CVE-2016-7431,CVE-2016-7433,CVE-2016-7434,CVE-2016-9310,CVE-2016-9311 Sources used: SUSE Linux Enterprise Server 11-SP4 (src): ntp-4.2.8p9-57.2 SUSE Linux Enterprise Debuginfo 11-SP4 (src): ntp-4.2.8p9-57.2
SUSE-SU-2016:3195-1: An update that solves 10 vulnerabilities and has 5 fixes is now available. Category: security (moderate) Bug References: 1009434,1011377,1011390,1011395,1011398,1011404,1011406,1011411,1011417,943216,956365,981252,988028,992038,992606 CVE References: CVE-2015-5219,CVE-2016-7426,CVE-2016-7427,CVE-2016-7428,CVE-2016-7429,CVE-2016-7431,CVE-2016-7433,CVE-2016-7434,CVE-2016-9310,CVE-2016-9311 Sources used: SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src): ntp-4.2.8p9-55.1 SUSE Linux Enterprise Server 12-SP2 (src): ntp-4.2.8p9-55.1 SUSE Linux Enterprise Server 12-SP1 (src): ntp-4.2.8p9-55.1 SUSE Linux Enterprise Desktop 12-SP2 (src): ntp-4.2.8p9-55.1 SUSE Linux Enterprise Desktop 12-SP1 (src): ntp-4.2.8p9-55.1
SUSE-SU-2016:3196-1: An update that solves 10 vulnerabilities and has 5 fixes is now available. Category: security (moderate) Bug References: 1009434,1011377,1011390,1011395,1011398,1011404,1011406,1011411,1011417,943216,956365,981252,988028,992038,992606 CVE References: CVE-2015-5219,CVE-2016-7426,CVE-2016-7427,CVE-2016-7428,CVE-2016-7429,CVE-2016-7431,CVE-2016-7433,CVE-2016-7434,CVE-2016-9310,CVE-2016-9311 Sources used: SUSE Linux Enterprise Server for SAP 12 (src): ntp-4.2.8p9-46.18.1 SUSE Linux Enterprise Server 12-LTSS (src): ntp-4.2.8p9-46.18.1
openSUSE-SU-2016:3280-1: An update that solves 10 vulnerabilities and has 5 fixes is now available. Category: security (moderate) Bug References: 1009434,1011377,1011390,1011395,1011398,1011404,1011406,1011411,1011417,943216,956365,981252,988028,992038,992606 CVE References: CVE-2015-5219,CVE-2016-7426,CVE-2016-7427,CVE-2016-7428,CVE-2016-7429,CVE-2016-7431,CVE-2016-7433,CVE-2016-7434,CVE-2016-9310,CVE-2016-9311 Sources used: openSUSE Leap 42.2 (src): ntp-4.2.8p9-27.1 openSUSE Leap 42.1 (src): ntp-4.2.8p9-27.1
SUSE-SU-2017:0255-1: An update that solves 12 vulnerabilities and has three fixes is now available. Category: security (moderate) Bug References: 1009434,1011377,1011390,1011395,1011398,1011404,1011406,1011411,1011417,943216,956365,981252,988028,992038,992606 CVE References: CVE-2015-5219,CVE-2015-8139,CVE-2015-8140,CVE-2016-7426,CVE-2016-7427,CVE-2016-7428,CVE-2016-7429,CVE-2016-7431,CVE-2016-7433,CVE-2016-7434,CVE-2016-9310,CVE-2016-9311 Sources used: SUSE OpenStack Cloud 5 (src): ntp-4.2.8p9-48.9.1 SUSE Manager Proxy 2.1 (src): ntp-4.2.8p9-48.9.1 SUSE Manager 2.1 (src): ntp-4.2.8p9-48.9.1 SUSE Linux Enterprise Server 11-SP3-LTSS (src): ntp-4.2.8p9-48.9.1 SUSE Linux Enterprise Server 11-SP2-LTSS (src): ntp-4.2.8p9-48.9.1 SUSE Linux Enterprise Point of Sale 11-SP3 (src): ntp-4.2.8p9-48.9.1 SUSE Linux Enterprise Debuginfo 11-SP3 (src): ntp-4.2.8p9-48.9.1 SUSE Linux Enterprise Debuginfo 11-SP2 (src): ntp-4.2.8p9-48.9.1