]> git.ipfire.org Git - thirdparty/ntp.git/commitdiff
Update NEWS for 3082
authorHarlan Stenn <stenn@ntp.org>
Sat, 1 Oct 2016 09:18:25 +0000 (09:18 +0000)
committerHarlan Stenn <stenn@ntp.org>
Sat, 1 Oct 2016 09:18:25 +0000 (09:18 +0000)
bk: 57ef7f61v6R8L_80E1pmwxyQS_Raig

NEWS

diff --git a/NEWS b/NEWS
index 2adf9544d073a85dbb725ad6dbd78908b39514b1..8000d1efc3f1d594465d2fab90ec35f28f903e29 100644 (file)
--- a/NEWS
+++ b/NEWS
@@ -8,6 +8,23 @@ Severity: HIGH
 In addition to bug fixes and enhancements, this release fixes the
 following X high- and Y low-severity vulnerabilities:
 
+* null pointer dereference in _IO_str_init_static_internal()
+   Date Resolved: xx October 2016; Dev (4.3.94) XX October 2016
+X  References: Sec 3082 / CVE-2016-XXXX / VU#XXXXX
+X  Affects: ntp-4.2.8p7, and ntp-4.3.92.
+X  CVSS2: HIGH 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C)
+X  CVSS3: HIGH 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+X  Summary: 
+X  Mitigation:
+        Implement BCP-38.
+        Upgrade to 4.2.8p8, or later, from the NTP Project Download Page
+           or the NTP Public Services Project Download Page
+        If you cannot upgrade from 4.2.8p7, the only other alternatives
+           are to patch your code or filter CRYPTO_NAK packets.
+        Properly monitor your ntpd instances, and auto-restart ntpd
+           (without -g) if it stops running. 
+   Credit: This weakness was discovered by Miroslav Lichvar of Red Hat.
+
 * Attack on interface selection
    Date Resolved: xx October 2016; Dev (4.3.94) XX October 2016
 X  References: Sec 3072 / CVE-2016-XXXX / VU#XXXXX