Bugzilla – Bug 952611
VUL-0: ntp: CVE-2015-7704,CVE-2015-7705: Clients that receive a KoD should validate the origin timestamp field
Last modified: 2016-08-18 15:52:52 UTC
+++ This bug was initially created as a clone of Bug #951608 +++ http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities Bug 2901 CVE-2015-7704, CVE-2015-7705 Clients that receive a KoD should validate the origin timestamp field. (Boston University) https://github.com/ntp-project/ntp/commit/21d57dc336dbe9a975baca5ce5ae4da5b71ff123
bugbot adjusting priority
The patch applied to SLE-12-GA (ntp-4.2.6p5) with minor changes, but it doesn't seem to fit SLE-11-SP1 (ntp-4.2.4p8) at all, where KoD handling seems to be entirely different.
Hello Mr. Max, any chances that a patch will be available for openSUSE 13.1? Version 4.2.6p5 is available there but no entry in the changelog with these CVEs and I couldn't find an according patch in Yast. Thank you for your time. Kind regards, Ronny Peine
Sorry, I didn't get around to do it for 13.1 and meanwhile it has ran out of official maintenance. But the fix is part of ntp-4.2.8p7, which we will soon release for 13.2, 42.1 and all maintained SLE versions.
An update workflow for this issue was started. This issue was rated as important. Please submit fixed packages until 2016-06-21. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/62822
SUSE-SU-2016:1912-1: An update that solves 43 vulnerabilities and has 9 fixes is now available. Category: security (important) Bug References: 782060,784760,905885,910063,916617,920183,920238,920893,920895,920905,924202,926510,936327,943218,943221,944300,951351,951559,951629,952611,957226,962318,962784,962802,962960,962966,962970,962988,962995,963000,963002,975496,977450,977451,977452,977455,977457,977458,977459,977461,977464,979302,981422,982056,982064,982065,982066,982067,982068,988417,988558,988565 CVE References: CVE-2015-1798,CVE-2015-1799,CVE-2015-5194,CVE-2015-5300,CVE-2015-7691,CVE-2015-7692,CVE-2015-7701,CVE-2015-7702,CVE-2015-7703,CVE-2015-7704,CVE-2015-7705,CVE-2015-7848,CVE-2015-7849,CVE-2015-7850,CVE-2015-7851,CVE-2015-7852,CVE-2015-7853,CVE-2015-7854,CVE-2015-7855,CVE-2015-7871,CVE-2015-7973,CVE-2015-7974,CVE-2015-7975,CVE-2015-7976,CVE-2015-7977,CVE-2015-7978,CVE-2015-7979,CVE-2015-8138,CVE-2015-8158,CVE-2016-1547,CVE-2016-1548,CVE-2016-1549,CVE-2016-1550,CVE-2016-1551,CVE-2016-2516,CVE-2016-2517,CVE-2016-2518,CVE-2016-2519,CVE-2016-4953,CVE-2016-4954,CVE-2016-4955,CVE-2016-4956,CVE-2016-4957 Sources used: SUSE Linux Enterprise Server 10 SP4 LTSS (src): ntp-4.2.8p8-0.7.1
all released