From: Harlan Stenn Date: Mon, 29 Jun 2015 19:33:22 +0000 (+0000) Subject: NEWS file update for bug 2853 X-Git-Tag: NTP_4_2_8P3~2 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=035de01ea81d67bbc6923bc0e3406ef0817e3894;p=thirdparty%2Fntp.git NEWS file update for bug 2853 bk: 55919d826Qi0yqAJp3n8kMuW52uJNA --- diff --git a/NEWS b/NEWS index 83d05e5b0..4e61d1b80 100644 --- a/NEWS +++ b/NEWS @@ -1,10 +1,25 @@ --- -NTP 4.2.8p3 (Harlan Stenn , 2015/06/xx) +NTP 4.2.8p3 (Harlan Stenn , 2015/06/29) -Focus: Bug fixes and enhancements. Leap-second improvements. +Focus: 1 Security fix. Bug fixes and enhancements. Leap-second improvements. Severity: MEDIUM +Security Fix: + +* [Sec 2853] Crafted remote config packet can crash some versions of + ntpd. Aleksis Kauppinen, Juergen Perlinger, Harlan Stenn. + +Under specific circumstances an attacker can send a crafted packet to +cause a vulnerable ntpd instance to crash. This requires each of the +following to be true: + +1) ntpd set up to allow remote configuration (not allowed by default), and +2) knowledge of the configuration password, and +3) access to a computer entrusted to perform remote configuration. + +This vulnerability is considered low-risk. + New features in this release: Optional (disabled by default) support to have ntpd provide smeared