Fixes the following security issue:
- MEDIUM: Sec 3661: Memory leak with CMAC keys
Systems that use a CMAC algorithm in ntp.keys will not release a bit of
memory on each packet that uses a CMAC key, eventually causing ntpd to run
out of memory and fail. The CMAC cleanup from https://bugs.ntp.org/3447,
part of ntp-4.2.8p11 and ntp-4.3.97, introduced a bug whereby the CMAC
data structure was no longer completely removed.
https://support.ntp.org/bin/view/Main/SecurityNotice#June_2020_ntp_4_2_8p15_NTP_Relea
Signed-off-by: Yegor Yefremov <yegorslists@googlemail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit
|
||
---|---|---|
.. | ||
0001-nano.patch | ||
0002-ntp-syscalls-fallback.patch | ||
0003-override-shell.patch | ||
Config.in | ||
ntp.hash | ||
ntp.mk | ||
ntpd.etc.conf | ||
ntpd.service | ||
S48sntp | ||
S49ntp |