Commit Graph

10 Commits

Author SHA1 Message Date
Gustavo Zacarias
e748e303da ntp: security bump to version 4.2.8p8
Fixes:
CVE-2016-4957 - Crypto-NAK crash
CVE-2016-4953 - Bad authentication demobilizes ephemeral associations
CVE-2016-4954 - Processing spoofed server packets
CVE-2016-4955 - Autokey association reset
CVE-2016-4956 - Broadcast interleave

Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
2016-06-03 09:45:40 +02:00
Gustavo Zacarias
ee18216d47 ntp: security bump to version 4.2.8p7
Fixes:

CVE-2016-1551 - Refclock impersonation vulnerability, AKA:
refclock-peering

CVE-2016-1549 - Sybil vulnerability: ephemeral association attack, AKA:
ntp-sybil - MITIGATION ONLY

CVE-2016-2516 - Duplicate IPs on unconfig directives will cause an
assertion botch

CVE-2016-2517 - Remote configuration trustedkey/requestkey values are not
properly validated

CVE-2016-2518 - Crafted addpeer with hmode > 7 causes array wraparound
with MATCH_ASSOC

CVE-2016-2519 - ctl_getitem() return value not always checked

CVE-2016-1547 - Validate crypto-NAKs, AKA: nak-dos

CVE-2016-1548 - Interleave-pivot - MITIGATION ONLY

CVE-2015-7704 - KoD fix: peer associations were broken by the fix for
NtpBug2901, AKA: Symmetric active/passive mode is broken

CVE-2015-8138 - Zero Origin Timestamp Bypass, AKA: Additional KoD Checks

CVE-2016-1550 - Improve NTP security against buffer comparison timing
attacks, authdecrypt-timing, AKA: authdecrypt-timing

Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2016-05-02 17:24:10 +02:00
Gustavo Zacarias
18542431c1 ntp: security bump to version 4.2.8p6
CVE-2015-7973 - Deja Vu: Replay attack on authenticated broadcast mode
CVE-2015-7974 - Skeleton Key: Missing key check allows impersonation
between authenticated peers
CVE-2015-7975 - nextvar() missing length check
CVE-2015-7976 - ntpq saveconfig command allows dangerous characters in
filenames
CVE-2015-7977 - reslist NULL pointer dereference
CVE-2015-7978 - Stack exhaustion in recursive traversal of restriction
list
CVE-2015-7979 - Off-path Denial of Service (DoS) attack on authenticated
broadcast mode
CVE-2015-8137 - origin: Zero Origin Timestamp Bypass
CVE-2015-8158 - Potential Infinite Loop in ntpq

Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2016-01-20 15:44:17 +01:00
Gustavo Zacarias
513c314dc3 ntp: security bump to version 4.2.8p5
Fixes:
CVE-2015-5300 - MITM attacker can force ntpd to make a step larger than
the panic threshold.

Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2016-01-08 18:31:04 +01:00
James Knight
73b193f840 ntp: bump to version 4.2.8p4
Signed-off-by: James Knight <james.knight@rockwellcollins.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2015-10-22 23:44:18 +02:00
Gustavo Zacarias
643af798cc ntp: security bump to version 4.2.8p3
Fixes:
CVE-2015-5146 - ntpd control message crash: Crafted NUL-byte in
configuration directive.

Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
2015-07-02 10:59:38 +02:00
Gustavo Zacarias
c765a7faa5 ntp: security bump to version 4.2.8p2
Fixes:
CVE-2015-1798 - ntpd accepts unauthenticated packets with symmetric key
crypto.
CVE-2015-1799 -  Authentication doesn't protect symmetric associations
against DoS attacks.

Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
2015-04-07 21:35:15 +02:00
Baruch Siach
67b845fcc9 ntp: security bump to version 4.2.8p1
Fixes:

CVE-2014-9297 - vallen is not validated in several places in ntp_crypto.c,
leading to a potential information leak or possibly a crash

CVE-2014-9298 - ::1 can be spoofed on some OSes (including "some versions" of
Linux), so ACLs based on IPv6 ::1 addresses can be bypassed

Drop a patch applied upstream, along with its accompanied AUTORECONF.

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2015-02-11 00:35:18 +01:00
Fabio Porcedda
a49bd36409 ntp: fix hash file
Add a space between the hash and filename so the hash can be used.

Signed-off-by: Fabio Porcedda <fabio.porcedda@gmail.com>
Cc: Gustavo Zacarias <gustavo@zacarias.com.ar>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2014-12-31 00:19:14 +01:00
Gustavo Zacarias
5d5c9a8dcb ntp: security bump to version 4.2.8
Fixes:

CVE-2014-9293 - ntpd generated a weak key for its internal use, with
full administrative privileges.  Attackers could use this key to
reconfigure ntpd (or to exploit other vulnerabilities).

CVE-2014-9294 - The ntp-keygen utility generated weak MD5 keys with
insufficient entropy.

CVE-2014-9295 - ntpd had several buffer overflows (both on the stack and
in the data section), allowing remote authenticated attackers to crash
ntpd or potentially execute arbitrary code.

CVE-2014-9296 - The general packet processing function in ntpd did not
handle an error case correctly.

Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
2014-12-23 11:36:07 +01:00