Bugzilla – Bug 1210390
VUL-0: CVE-2023-26555: ntp: ntpd: out-of-bounds write in praecis_parse in ntpd/refclock_palisade.c
Last modified: 2024-05-06 12:00:24 UTC
CVE-2023-26555 praecis_parse in ntpd/refclock_palisade.c in NTP 4.2.8p15 has an out-of-bounds write. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-26555 https://www.cve.org/CVERecord?id=CVE-2023-26555 https://github.com/spwpun/ntp-4.2.8p15-cves/blob/main/CVE-2023-26555
https://github.com/spwpun/ntp-4.2.8p15-cves/issues/1#issuecomment-1506522935 > I meanwhile did a more in-depth analysis of refclock_palisade.c. It confirmed > my former assumption that praecis_parse() only ever gets to see data that was > received via a TTY from a certain GPS receiver, and only if such a GPS > receiver is configured in ntp.conf, but it never gets called with data that > was received over the network. CVSS score wurde auf 5.5 gesetzt.
Upstream finally released 4.2.8p16 that addresses this issue and replaced it quickly by 4.2.8p17, because it had a few regressions: https://www.ntp.org/support/securitynotice/4_2_8p16-release-announcement/ https://www.ntp.org/support/securitynotice/4_2_8p17-release-announcement/ Submissions for Tumbleweed and SLE will follow shortly...
This is an autogenerated message for OBS integration: This bug (1210390) was mentioned in https://build.opensuse.org/request/show/1092906 Factory / ntp
SUSE-SU-2023:2609-1: An update that solves one vulnerability can now be installed. Category: security (moderate) Bug References: 1210390 CVE References: CVE-2023-26555 Sources used: SUSE Linux Enterprise High Performance Computing 12 SP5 (src): ntp-4.2.8p17-103.1 SUSE Linux Enterprise Server 12 SP5 (src): ntp-4.2.8p17-103.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): ntp-4.2.8p17-103.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2608-1: An update that solves one vulnerability can now be installed. Category: security (moderate) Bug References: 1210390 CVE References: CVE-2023-26555 Sources used: openSUSE Leap 15.4 (src): ntp-4.2.8p17-150000.4.25.1 openSUSE Leap 15.5 (src): ntp-4.2.8p17-150000.4.25.1 Legacy Module 15-SP4 (src): ntp-4.2.8p17-150000.4.25.1 Legacy Module 15-SP5 (src): ntp-4.2.8p17-150000.4.25.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
done, closing