{"affected":[{"ecosystem_specific":{"binaries":[{"ntp":"4.2.8p11-64.5.1","ntp-doc":"4.2.8p11-64.5.1"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud 7","name":"ntp","purl":"pkg:rpm/suse/ntp&distro=SUSE%20OpenStack%20Cloud%207"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.2.8p11-64.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"ntp":"4.2.8p11-64.5.1","ntp-doc":"4.2.8p11-64.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP3","name":"ntp","purl":"pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.2.8p11-64.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"ntp":"4.2.8p11-64.5.1","ntp-doc":"4.2.8p11-64.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP1","name":"ntp","purl":"pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.2.8p11-64.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"ntp":"4.2.8p11-64.5.1","ntp-doc":"4.2.8p11-64.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"ntp","purl":"pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.2.8p11-64.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"ntp":"4.2.8p11-64.5.1","ntp-doc":"4.2.8p11-64.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP1-LTSS","name":"ntp","purl":"pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.2.8p11-64.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"ntp":"4.2.8p11-64.5.1","ntp-doc":"4.2.8p11-64.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-LTSS","name":"ntp","purl":"pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.2.8p11-64.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"ntp":"4.2.8p11-64.5.1","ntp-doc":"4.2.8p11-64.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP3","name":"ntp","purl":"pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.2.8p11-64.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"ntp":"4.2.8p11-64.5.1","ntp-doc":"4.2.8p11-64.5.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","name":"ntp","purl":"pkg:rpm/suse/ntp&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.2.8p11-64.5.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"ntp":"4.2.8p11-64.5.1","ntp-doc":"4.2.8p11-64.5.1"}]},"package":{"ecosystem":"SUSE:Enterprise Storage 4","name":"ntp","purl":"pkg:rpm/suse/ntp&distro=SUSE%20Enterprise%20Storage%204"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.2.8p11-64.5.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for ntp fixes the following issues:\n\n- Update to 4.2.8p11 (bsc#1082210):\n  * CVE-2016-1549: Sybil vulnerability: ephemeral association\n    attack. While fixed in ntp-4.2.8p7, there are significant\n    additional protections for this issue in 4.2.8p11.\n  * CVE-2018-7182: ctl_getitem(): buffer read overrun\n    leads to undefined behavior and information leak. (bsc#1083426)\n  * CVE-2018-7170: Multiple authenticated ephemeral\n    associations. (bsc#1083424)\n  * CVE-2018-7184: Interleaved symmetric mode cannot\n    recover from bad state. (bsc#1083422)\n  * CVE-2018-7185: Unauthenticated packet can reset\n    authenticated interleaved association. (bsc#1083420)\n  * CVE-2018-7183: ntpq:decodearr() can write beyond its\n    buffer limit.(bsc#1083417)\n- Don't use libevent's cached time stamps in sntp. (bsc#1077445)\n\nThis update is a reissue of the previous update with LTSS channels included.\n","id":"SUSE-SU-2018:1765-1","modified":"2018-06-20T13:46:39Z","published":"2018-06-20T13:46:39Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20181765-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1077445"},{"type":"REPORT","url":"https://bugzilla.suse.com/1082063"},{"type":"REPORT","url":"https://bugzilla.suse.com/1082210"},{"type":"REPORT","url":"https://bugzilla.suse.com/1083417"},{"type":"REPORT","url":"https://bugzilla.suse.com/1083420"},{"type":"REPORT","url":"https://bugzilla.suse.com/1083422"},{"type":"REPORT","url":"https://bugzilla.suse.com/1083424"},{"type":"REPORT","url":"https://bugzilla.suse.com/1083426"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-1549"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-7170"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-7182"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-7183"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-7184"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-7185"}],"related":["CVE-2016-1549","CVE-2018-7170","CVE-2018-7182","CVE-2018-7183","CVE-2018-7184","CVE-2018-7185"],"summary":"Security update for ntp","upstream":["CVE-2016-1549","CVE-2018-7170","CVE-2018-7182","CVE-2018-7183","CVE-2018-7184","CVE-2018-7185"]}