Files
ntp/ntp-netlink.patch
Reinhard Max 7a2805aa9c - Update to 4.2.8p9:
* CVE-2016-9311: Trap crash.
  * CVE-2016-9310: Mode 6 unauthenticated trap information
    disclosure and DDoS vector.
  * CVE-2016-7427: Broadcast Mode Replay Prevention DoS.
  * CVE-2016-7428: Broadcast Mode Poll Interval Enforcement DoS.
  * CVE-2016-7431: Regression: 010-origin: Zero Origin Timestamp
    Bypass.
  * CVE-2016-7434: Null pointer dereference in
    _IO_str_init_static_internal().
  * CVE-2016-7429: Interface selection attack.
  * CVE-2016-7426: Client rate limiting and server responses.
  * CVE-2016-7433: Reboot sync calculation problem.
  * Fix a spurious error message (obsoletes ntp-sigchld.patch).
  * Other bugfixes, see /usr/share/doc/packages/ntp/ChangeLog.
- Fix a regression in "trap" (bsc#981252, ntp-trap.patch).
- Reduce the number of netlink groups to listen on for changes to
  the local network setup (bsc#992606, ntp-netlink.patch).
- Fix segfault in "sntp -a" (bnc#1009434, ntp-sntp-a.patch).
- Silence an OpenSSL version warning (bsc#992038,
  ntp-openssl-version.patch).

OBS-URL: https://build.opensuse.org/package/show/network:time/ntp?expand=0&rev=153
2016-11-22 16:24:33 +00:00

15 lines
518 B
Diff

--- ntpd/ntp_io.c
+++ ntpd/ntp_io.c
@@ -4765,9 +4765,7 @@ init_async_notifications()
ZERO(sa);
sa.nl_family = PF_NETLINK;
sa.nl_groups = RTMGRP_LINK | RTMGRP_IPV4_IFADDR
- | RTMGRP_IPV6_IFADDR | RTMGRP_IPV4_ROUTE
- | RTMGRP_IPV4_MROUTE | RTMGRP_IPV6_ROUTE
- | RTMGRP_IPV6_MROUTE;
+ | RTMGRP_IPV6_IFADDR | RTMGRP_IPV4_ROUTE;
if (bind(fd, (struct sockaddr *)&sa, sizeof(sa)) < 0) {
msyslog(LOG_ERR,
"bind failed on routing socket (%m) - using polled interface update");