SUSE-SU-2018:3352-1

Source
https://www.suse.com/support/update/announcement/2018/suse-su-20183352-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2018:3352-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2018:3352-1
Related
Published
2018-10-23T15:51:48Z
Modified
2018-10-23T15:51:48Z
Summary
Security update for ntp
Details

NTP was updated to 4.2.8p12 (bsc#1111853):

  • CVE-2018-12327: Fixed stack buffer overflow in the openhost() command-line call of NTPQ/NTPDC. (bsc#1098531)
  • CVE-2018-7170: Add further tweaks to improve the fix for the ephemeral association time spoofing additional protection (bsc#1083424)

Please also see https://www.nwtime.org/network-time-foundation-publishes-ntp-4-2-8p12/ for more information.

References

Affected packages

SUSE:Linux Enterprise Server 11 SP4 / ntp

Package

Name
ntp
Purl
pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.2.8p12-64.7.1

Ecosystem specific

{
    "binaries": [
        {
            "ntp-doc": "4.2.8p12-64.7.1",
            "ntp": "4.2.8p12-64.7.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 11 SP4 / ntp

Package

Name
ntp
Purl
pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.2.8p12-64.7.1

Ecosystem specific

{
    "binaries": [
        {
            "ntp-doc": "4.2.8p12-64.7.1",
            "ntp": "4.2.8p12-64.7.1"
        }
    ]
}