* CVE-2016-9311: Trap crash.
* CVE-2016-9310: Mode 6 unauthenticated trap information
disclosure and DDoS vector.
* CVE-2016-7427: Broadcast Mode Replay Prevention DoS.
* CVE-2016-7428: Broadcast Mode Poll Interval Enforcement DoS.
* CVE-2016-7431: Regression: 010-origin: Zero Origin Timestamp
Bypass.
* CVE-2016-7434: Null pointer dereference in
_IO_str_init_static_internal().
* CVE-2016-7429: Interface selection attack.
* CVE-2016-7426: Client rate limiting and server responses.
* CVE-2016-7433: Reboot sync calculation problem.
* Fix a spurious error message (obsoletes ntp-sigchld.patch).
* Other bugfixes, see /usr/share/doc/packages/ntp/ChangeLog.
- Fix a regression in "trap" (bsc#981252, ntp-trap.patch).
- Reduce the number of netlink groups to listen on for changes to
the local network setup (bsc#992606, ntp-netlink.patch).
- Fix segfault in "sntp -a" (bnc#1009434, ntp-sntp-a.patch).
- Silence an OpenSSL version warning (bsc#992038,
ntp-openssl-version.patch).
OBS-URL: https://build.opensuse.org/package/show/network:time/ntp?expand=0&rev=153
15 lines
518 B
Diff
15 lines
518 B
Diff
--- ntpd/ntp_io.c
|
|
+++ ntpd/ntp_io.c
|
|
@@ -4765,9 +4765,7 @@ init_async_notifications()
|
|
ZERO(sa);
|
|
sa.nl_family = PF_NETLINK;
|
|
sa.nl_groups = RTMGRP_LINK | RTMGRP_IPV4_IFADDR
|
|
- | RTMGRP_IPV6_IFADDR | RTMGRP_IPV4_ROUTE
|
|
- | RTMGRP_IPV4_MROUTE | RTMGRP_IPV6_ROUTE
|
|
- | RTMGRP_IPV6_MROUTE;
|
|
+ | RTMGRP_IPV6_IFADDR | RTMGRP_IPV4_ROUTE;
|
|
if (bind(fd, (struct sockaddr *)&sa, sizeof(sa)) < 0) {
|
|
msyslog(LOG_ERR,
|
|
"bind failed on routing socket (%m) - using polled interface update");
|
|
|