{"affected":[{"ecosystem_specific":{"binaries":[{"ntp":"4.2.8p11-46.26.2","ntp-doc":"4.2.8p11-46.26.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12-LTSS","name":"ntp","purl":"pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.2.8p11-46.26.2"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for ntp fixes the following issues:\n\n- Update to 4.2.8p11 (bsc#1082210):\n  * CVE-2016-1549: Sybil vulnerability: ephemeral association\n    attack. While fixed in ntp-4.2.8p7, there are significant\n    additional protections for this issue in 4.2.8p11.\n  * CVE-2018-7182: ctl_getitem(): buffer read overrun\n    leads to undefined behavior and information leak. (bsc#1083426)\n  * CVE-2018-7170: Multiple authenticated ephemeral\n    associations. (bsc#1083424)\n  * CVE-2018-7184: Interleaved symmetric mode cannot\n    recover from bad state. (bsc#1083422)\n  * CVE-2018-7185: Unauthenticated packet can reset\n    authenticated interleaved association. (bsc#1083420)\n  * CVE-2018-7183: ntpq:decodearr() can write beyond its\n    buffer limit.(bsc#1083417)\n- Don't use libevent's cached time stamps in sntp. (bsc#1077445)\n- Fix systemd migration in %pre (bsc#1034892).\n\n","id":"SUSE-SU-2018:1464-1","modified":"2018-05-29T14:44:40Z","published":"2018-05-29T14:44:40Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20181464-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1034892"},{"type":"REPORT","url":"https://bugzilla.suse.com/1077445"},{"type":"REPORT","url":"https://bugzilla.suse.com/1082063"},{"type":"REPORT","url":"https://bugzilla.suse.com/1082210"},{"type":"REPORT","url":"https://bugzilla.suse.com/1083417"},{"type":"REPORT","url":"https://bugzilla.suse.com/1083420"},{"type":"REPORT","url":"https://bugzilla.suse.com/1083422"},{"type":"REPORT","url":"https://bugzilla.suse.com/1083424"},{"type":"REPORT","url":"https://bugzilla.suse.com/1083426"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-1549"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-7170"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-7182"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-7183"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-7184"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-7185"}],"related":["CVE-2016-1549","CVE-2018-7170","CVE-2018-7182","CVE-2018-7183","CVE-2018-7184","CVE-2018-7185"],"summary":"Security update for ntp","upstream":["CVE-2016-1549","CVE-2018-7170","CVE-2018-7182","CVE-2018-7183","CVE-2018-7184","CVE-2018-7185"]}