Bug 952611 (CVE-2015-7704) - VUL-0: ntp: CVE-2015-7704,CVE-2015-7705: Clients that receive a KoD should validate the origin timestamp field
Summary: VUL-0: ntp: CVE-2015-7704,CVE-2015-7705: Clients that receive a KoD should v...
Status: RESOLVED FIXED
Alias: CVE-2015-7704
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Deadline: 2016-06-21
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard: maint:released:sle10-sp4:62913 maint:...
Keywords:
Depends on:
Blocks: 951608
  Show dependency treegraph
 
Reported: 2015-10-29 10:47 UTC by Andreas Stieger
Modified: 2016-08-18 15:52 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Andreas Stieger 2015-10-29 10:47:21 UTC
+++ This bug was initially created as a clone of Bug #951608 +++

http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities

Bug 2901 CVE-2015-7704, CVE-2015-7705 Clients that receive a KoD should validate the origin timestamp field. (Boston University)

https://github.com/ntp-project/ntp/commit/21d57dc336dbe9a975baca5ce5ae4da5b71ff123
Comment 1 Swamp Workflow Management 2015-10-29 23:00:26 UTC
bugbot adjusting priority
Comment 2 Reinhard Max 2015-11-06 13:50:37 UTC
The patch applied to SLE-12-GA (ntp-4.2.6p5) with minor changes, but it doesn't seem to fit SLE-11-SP1 (ntp-4.2.4p8) at all, where KoD handling seems to be entirely different.
Comment 3 Forgotten User hovWKlcOPJ 2015-12-08 20:19:07 UTC
Hello Mr. Max,

any chances that a patch will be available for openSUSE 13.1?
Version 4.2.6p5 is available there but no entry in the changelog with these CVEs and I couldn't find an according patch in Yast.
Thank you for your time.

Kind regards,
Ronny Peine
Comment 4 Reinhard Max 2016-05-03 17:10:14 UTC
Sorry, I didn't get around to do it for 13.1 and meanwhile it has ran out of official maintenance.

But the fix is part of ntp-4.2.8p7, which we will soon release for 13.2, 42.1 and all maintained SLE versions.
Comment 5 Swamp Workflow Management 2016-06-14 15:35:28 UTC
An update workflow for this issue was started.
This issue was rated as important.
Please submit fixed packages until 2016-06-21.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/62822
Comment 6 Swamp Workflow Management 2016-07-29 17:12:21 UTC
SUSE-SU-2016:1912-1: An update that solves 43 vulnerabilities and has 9 fixes is now available.

Category: security (important)
Bug References: 782060,784760,905885,910063,916617,920183,920238,920893,920895,920905,924202,926510,936327,943218,943221,944300,951351,951559,951629,952611,957226,962318,962784,962802,962960,962966,962970,962988,962995,963000,963002,975496,977450,977451,977452,977455,977457,977458,977459,977461,977464,979302,981422,982056,982064,982065,982066,982067,982068,988417,988558,988565
CVE References: CVE-2015-1798,CVE-2015-1799,CVE-2015-5194,CVE-2015-5300,CVE-2015-7691,CVE-2015-7692,CVE-2015-7701,CVE-2015-7702,CVE-2015-7703,CVE-2015-7704,CVE-2015-7705,CVE-2015-7848,CVE-2015-7849,CVE-2015-7850,CVE-2015-7851,CVE-2015-7852,CVE-2015-7853,CVE-2015-7854,CVE-2015-7855,CVE-2015-7871,CVE-2015-7973,CVE-2015-7974,CVE-2015-7975,CVE-2015-7976,CVE-2015-7977,CVE-2015-7978,CVE-2015-7979,CVE-2015-8138,CVE-2015-8158,CVE-2016-1547,CVE-2016-1548,CVE-2016-1549,CVE-2016-1550,CVE-2016-1551,CVE-2016-2516,CVE-2016-2517,CVE-2016-2518,CVE-2016-2519,CVE-2016-4953,CVE-2016-4954,CVE-2016-4955,CVE-2016-4956,CVE-2016-4957
Sources used:
SUSE Linux Enterprise Server 10 SP4 LTSS (src):    ntp-4.2.8p8-0.7.1
Comment 7 Marcus Meissner 2016-08-01 08:28:34 UTC
all released