Security update for ntp (important)

2015-02-13T19:04:50
ID SUSE-SU-2015:0259-2
Type suse
Reporter Suse
Modified 2015-02-13T19:04:50

Description

ntp has been updated to fix four security issues:

   * CVE-2014-9294: ntp-keygen used a weak RNG seed, which made it easier
     for remote attackers to defeat cryptographic protection mechanisms
     via a brute-force attack. (bsc#910764)
   * CVE-2014-9293: The config_auth function, when an auth key is not
     configured, improperly generated a key, which made it easier for
     remote attackers to defeat cryptographic protection mechanisms via a
     brute-force attack. (bsc#910764)
   * CVE-2014-9298: ::1 can be spoofed on some operating systems, so ACLs
     based on IPv6 ::1 addresses could be bypassed. (bsc#910764)
   * CVE-2014-9297: vallen is not validated in several places in
     ntp_crypto.c, leading to potential information leak. (bsc#910764)

Security Issues:

   * CVE-2014-9294
     <<a  rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9294">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9294</a>>
   * CVE-2014-9293
     <<a  rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9293">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9293</a>>
   * CVE-2014-9298
     <<a  rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9298">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9298</a>>
   * CVE-2014-9297
     <<a  rel="nofollow" href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9297">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9297</a>>