SUSE SLES12 Security Update : chrony (SUSE-SU-2025:3868-1)

medium Nessus Plugin ID 272086

Language:

Synopsis

The remote SUSE host is missing a security update.

Description

The remote SUSE Linux SLES12 host has a package installed that is affected by a vulnerability as referenced in the SUSE- SU-2025:3868-1 advisory.

Security issues fixed:
- Race condition during socket creation by chronyc allows privilege escalation from user chrony to root (bsc#1246544).

Other issues fixed:
- Improve connection retry intervals when facing NTS-KE related issues (bsc#1213551).
* nts: use shorter NTS-KE retry interval when network is down.
* ntp: don't adjust poll interval when waiting for NTS-KE.

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected chrony package.

See Also

https://bugzilla.suse.com/1194220

https://bugzilla.suse.com/1194229

https://bugzilla.suse.com/1213551

https://bugzilla.suse.com/1246544

http://www.nessus.org/u?8806bc6c

Plugin Details

Severity: Medium

ID: 272086

File Name: suse_SU-2025-3868-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 10/31/2025

Updated: 10/31/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:chrony, cpe:/o:novell:suse_linux:12

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 10/30/2025

Vulnerability Publication Date: 10/30/2025

Reference Information

SuSE: SUSE-SU-2025:3868-1