openSUSE: 2019:0082-1: important: ntpsec
Description
This update for ntpsec to version 1.1.3 fixes the following issues: Security issues fixed: - CVE-2019-6442: Fixed a out of bounds write via a malformed config request (boo#1122132) - CVE-2019-6443: Fixed a stack-based buffer over-read in the ctl_getitem function (boo#1122144) - CVE-2019-6444: Fixed a stack-based buffer over-read in the process_control function (boo#1122134) - CVE-2019-6445: Fixed a NULL pointer dereference in the ctl_getitem function (boo#1122131)
Patch
Patch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - openSUSE Leap 15.0: zypper in -t patch openSUSE-2019-82=1
Package List
- openSUSE Leap 15.0 (x86_64): ntpsec-1.1.3-lp150.2.3.1 ntpsec-debuginfo-1.1.3-lp150.2.3.1 ntpsec-debugsource-1.1.3-lp150.2.3.1 ntpsec-utils-1.1.3-lp150.2.3.1 python3-ntp-1.1.3-lp150.2.3.1 python3-ntp-debuginfo-1.1.3-lp150.2.3.1
References
https://www.suse.com/security/cve/CVE-2019-6442.html https://www.suse.com/security/cve/CVE-2019-6443.html https://www.suse.com/security/cve/CVE-2019-6444.html https://www.suse.com/security/cve/CVE-2019-6445.html https://bugzilla.suse.com/1122131 https://bugzilla.suse.com/1122132 https://bugzilla.suse.com/1122134 https://bugzilla.suse.com/1122144--