Advisories were posted a few days ago here: https://github.com/spwpun/ntp-4.2.8p15-cves with very little detail. I've been told by a security guy from SUSE that "our engineer review says the the mstolfp ones are only callable via ntpq (so would need to have someone point ntpq at a malicious server) and the last one is in a specific ntp reference clock driver" so these may not be a big deal.
Assigning globally as no particular packager in view; CC'ing Jean-Pierre who did the most recent correction to ntp.
Assignee: bugsquad => pkg-bugsCC: (none) => jean-pierre
SUSE has issued an advisory for this on May 9: https://lists.suse.com/pipermail/sle-security-updates/2023-May/014820.html
Hi, The patch from openSUSE that solves CVE-2023-2655[1-4] was committed to SVN. For the moment, there is no fix for CVE-2023-26555. Best regards, Nico.
CC: (none) => nicolas.salguero
Mageia 8 EOL
Status: NEW => RESOLVEDResolution: (none) => OLD