ntp was updated to fix two security issues:
* CVE-2015-1799: ntpd authentication did not protect symmetric
associations against DoS attacks (bsc#924202)
* CVE-2015-3405: ntp-keygen may generate non-random symmetric keys on
big-endian systems (bsc#928321)
Security Issues:
* CVE-2015-1799
<<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1799">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1799</a>>
* CVE-2015-3405
<<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3405">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3405</a>>
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
SUSE Linux Enterprise Desktop | 11.3 | x86_64 | ntp | < 4.2.4p8-1.29.36.1 | ntp-4.2.4p8-1.29.36.1.x86_64.rpm |
SUSE Linux Enterprise Server for VMware | 11.3 | i586 | ntp-doc | < 4.2.4p8-1.29.36.1 | ntp-doc-4.2.4p8-1.29.36.1.i586.rpm |
SUSE Linux Enterprise Server | 11.3 | ppc64 | ntp-doc | < 4.2.4p8-1.29.36.1 | ntp-doc-4.2.4p8-1.29.36.1.ppc64.rpm |
SUSE Linux Enterprise Server for VMware | 11.3 | x86_64 | ntp | < 4.2.4p8-1.29.36.1 | ntp-4.2.4p8-1.29.36.1.x86_64.rpm |
SUSE Linux Enterprise Server for VMware | 11.3 | i586 | ntp | < 4.2.4p8-1.29.36.1 | ntp-4.2.4p8-1.29.36.1.i586.rpm |
SUSE Linux Enterprise Server | 11.3 | ia64 | ntp-doc | < 4.2.4p8-1.29.36.1 | ntp-doc-4.2.4p8-1.29.36.1.ia64.rpm |
SUSE Linux Enterprise Server | 11.3 | i586 | ntp | < 4.2.4p8-1.29.36.1 | ntp-4.2.4p8-1.29.36.1.i586.rpm |
SUSE Linux Enterprise Server | 11.3 | s390x | ntp | < 4.2.4p8-1.29.36.1 | ntp-4.2.4p8-1.29.36.1.s390x.rpm |
SUSE Linux Enterprise Server | 11.3 | ia64 | ntp | < 4.2.4p8-1.29.36.1 | ntp-4.2.4p8-1.29.36.1.ia64.rpm |
SUSE Linux Enterprise Server | 11.3 | ppc64 | ntp | < 4.2.4p8-1.29.36.1 | ntp-4.2.4p8-1.29.36.1.ppc64.rpm |