[Bug 1812458] [NEW] Sync ntpsec 1.1.3+dfsg1-1 (universe) from Debian sid (main)
Launchpad Bug Tracker
1812458 at bugs.launchpad.net
Fri Jan 18 23:35:59 UTC 2019
You have been subscribed to a public bug by Richard Laager (rlaager):
For the sync request:
I believe disco currently has 1.1.2+dfsg1-6. (packages.ubuntu.com is
broken, so it's harder than normal for me to tell.) There are no Ubuntu
changes for ntpsec in disco. 1.1.3+dfsg1-1 is the immediate next release
in Debian.
ntpsec (1.1.3+dfsg1-1) unstable; urgency=high
* New upstream version (Closes: 919513)
- Lots of typo fixes, documentation cleanups, test targets.
- CVE-2019-6442: "An authenticated attacker can write one byte out of
bounds in ntpd via a malformed config request, related to
config_remotely in ntp_config.c, yyparse in ntp_parser.tab.c, and
yyerror in ntp_parser.y."
- CVE-2019-6443: "Because of a bug in ctl_getitem, there is a stack-based
buffer over-read in read_sysvars in ntp_control.c in ntpd.
- CVE-2019-6444: "process_control() in ntp_control.c has a stack-based
buffer over-read because attacker-controlled data is dereferenced by
ntohl() in ntpd."
- CVE-2019-6445: "An authenticated attacker can cause a NULL pointer
dereference and ntpd crash in ntp_control.c, related to ctl_getitem."
* Drop debian/patches/fix-ntploggps.patch (merged upstream)
* Refresh patches
* Revert "Use python3-gps"
At this time, python3-gps is only available in experimental.
* Disable the waf PYTHON_GPS check
* Update debian/copyright
* Fix ntpdate.8 documentation of -B
* Changes as of ntp_4.2.8p12+dfsg-3 have been merged as appropriate:
- Update ntpdate.8 from ntpdate.html
Thanks to Bernhard Schmidt <berni at debian.org>
- Update ntpdate.README.Debian
Thanks to Bernhard Schmidt <berni at debian.org>
- As a notable exception, while the ntp package has removed the ntpdate
hooks, I have not (yet?) done so in ntpsec.
* Set Rules-Requires-Root: no
* Sort debian/ntpsec.maintscript
-- Richard Laager <rlaager at wiktel.com> Thu, 17 Jan 2019 04:17:46 -0600
----
NTPsec < 1.1.3 has the following CVEs:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6442
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6443
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6444
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6445
I am the maintainer of ntpsec in Debian. Debian has 1.1.3.
Ubuntu needs the following:
- disco needs a sync from Debian.
- cosmic needs the patches backported.
- bionic needs the patches backported.
I'm happy to do the work.
BTW, these issues may impact the ntp package too, but I'm not sure that
anyone (the original report, ntp upstream, or ntp in Debian) has
evaluated that.
** Affects: ntpsec (Ubuntu)
Importance: Undecided
Assignee: Richard Laager (rlaager)
Status: Confirmed
--
Sync ntpsec 1.1.3+dfsg1-1 (universe) from Debian sid (main)
https://bugs.launchpad.net/bugs/1812458
You received this bug notification because you are a member of Ubuntu Sponsors Team, which is subscribed to the bug report.
More information about the Ubuntu-sponsors
mailing list