Bug 1187088 (CVE-2021-22212) - VUL-1: CVE-2021-22212: ntpsec: ntpkeygen can generate keys that ntpd fails to parse
Summary: VUL-1: CVE-2021-22212: ntpsec: ntpkeygen can generate keys that ntpd fails to...
Status: RESOLVED FIXED
Alias: CVE-2021-22212
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Minor
Target Milestone: ---
Assignee: Martin Hauke
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/301424/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2021-06-09 06:46 UTC by Alexander Bergmann
Modified: 2024-07-22 18:06 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2021-06-09 06:46:51 UTC
MISC:bugzilla.redhat.com:CVE-2021-22212

ntpkeygen can generate keys that ntpd fails to parse. NTPsec 1.2.0 allows
ntpkeygen to generate keys with '#' characters. ntpd then either pads, shortens
the key, or fails to load these keys entirely, depending on the key type and the
placement of the '#'. This results in the administrator not being able to use
the keys as expected or the keys are shorter than expected and easier to
brute-force, possibly resulting in MITM attacks between ntp clients and ntp
servers. For short AES128 keys, ntpd generates a warning that it is padding
them.

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1955859
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22212
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22212
https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-22212.json
https://gitlab.com/NTPsec/ntpsec/-/issues/699
Comment 2 Gianluca Gabrielli 2021-06-09 15:13:15 UTC
Affected package:
 - openSUSE:Factory/ntpsec 1.1.9

Please upgrade to 1.2.1
Comment 3 Martin Hauke 2021-06-11 15:59:14 UTC
An update to version 1.2.0 is on it's way https://build.opensuse.org/request/show/898852
Comment 4 Camila Camargo de Matos 2024-07-22 18:06:34 UTC
openSUSE:Factory/ntpsec is fixed for this issue. The bug can be closed.