Bug 943219 - (CVE-2015-5195) VUL-1: CVE-2015-5195: ntp: ntpd crash when processing config commands with statistics type
(CVE-2015-5195)
VUL-1: CVE-2015-5195: ntp: ntpd crash when processing config commands with st...
Status: RESOLVED INVALID
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P4 - Low : Minor
: ---
Assigned To: Reinhard Max
Security Team bot
https://smash.suse.de/issue/142580/
CVSSv2:RedHat:CVE-2015-5195:4.0:(AV:N...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2015-08-26 07:54 UTC by Sebastian Krahmer
Modified: 2019-05-01 16:51 UTC (History)
5 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sebastian Krahmer 2015-08-26 07:54:26 UTC
Quoting from oss-sec:

"It was found that ntpd exits with a segmentation fault when a statistics
type that was not enabled during compilation (e.g. timingstats) is
referenced by the statistics or filegen configuration command, for example:

ntpq -c ':config statistics timingstats'
ntpq -c ':config filegen timingstats'

Upstream fix:

http://bk.ntp.org/ntp-dev/?PAGE=patch&REV=4d253ed0A400LyhRQIV0u23NJwuGAA
https://github.com/ntp-project/ntp/commit/52e977d79a0c4ace997e5c74af429844da2f27be

"

rh#1254544



References:
https://bugzilla.redhat.com/show_bug.cgi?id=1254544
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5195
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195
Comment 1 Swamp Workflow Management 2015-08-26 22:00:46 UTC
bugbot adjusting priority
Comment 2 Andreas Stieger 2015-10-02 14:57:01 UTC
4.2.4 is not affected.
4.2.8, 4.2.6 is affected.

Affects SLE 11 SP4 and SLE 12.

Planned update.
Comment 3 SMASH SMASH 2016-01-07 10:25:17 UTC
An update workflow for this issue was started.

This issue was rated as "moderate".
Please submit fixed packages until "Jan. 14, 2016".

When done, reassign the bug to "security-team@suse.de".
/update/121227/.
Comment 4 SMASH SMASH 2016-01-07 10:25:37 UTC
An update workflow for this issue was started.

This issue was rated as "moderate".
Please submit fixed packages until "Jan. 14, 2016".

When done, reassign the bug to "security-team@suse.de".
/update/121227/.
Comment 5 Reinhard Max 2016-05-18 10:43:53 UTC
Are you sure 4.2.8 is affected? The upstream fix mentioned in comment 0 was committed in 2011 to the 4.2.7 devel branch which resulted in the 4.2.8 release in 2015.
Comment 7 Andreas Stieger 2016-05-24 11:11:24 UTC
(In reply to Reinhard Max from comment #5)
> Are you sure 4.2.8 is affected? The upstream fix mentioned in comment 0 was
> committed in 2011 to the 4.2.7 devel branch which resulted in the 4.2.8
> release in 2015.

My mistake, you are right.
Comment 8 Andreas Stieger 2016-05-24 11:14:33 UTC
Closing as there are no more targets requiring an update.