[ntpsec-main commit] Document security fixes and add CVE IDs
Daniel Franke
dfranke at ntpsec.org
Tue Nov 3 20:59:47 UTC 2015
Module: ntpsec-main
Branch: master
Commit: 34c67c11669786f32ce51889af66bf4663ee8053
Changeset: http://git.ntpsec.org//commit/?id=34c67c11669786f32ce51889af66bf4663ee8053
Author: Daniel Fox Franke <dfoxfranke at gmail.com>
Date: Tue Nov 3 15:59:38 2015 -0500
Document security fixes and add CVE IDs
---
NEWS | 26 ++++++++++++++++++++++++--
devel/TODO | 3 ---
2 files changed, 24 insertions(+), 5 deletions(-)
diff --git a/NEWS b/NEWS
index 37e4c9c..24bd0ad 100644
--- a/NEWS
+++ b/NEWS
@@ -31,7 +31,29 @@ These reflect fixes to NTP Classic since the 2015-06-06 fork point.
* [Bug 2886] Misspelling: "outlyer" should be "outlier"
* [Bug 2890] Ignore ENOBUFS on routing netlink socket. Konstantin Khlebnikov.
* [Bug 2902] configuration directives "pidfile" and "driftfile"
- should be local-only. (patch by Miroslav Lichvar)
-* [Bug 2909] Slow memory leak in CRYPTO_ASSOC
+ should be local-only. (patch by Miroslav Lichvar) (CVE-2015-7703)
+* [Bug 2909] Slow memory leak in CRYPTO_ASSOC (CVE-2015-7701)
+* [Bug 2941] NAK to the Future: Symmetric association authentication
+ bypass via crypto-NAK (CVE-2015-7871)
+* [Bug 2922] decodenetnum() will ASSERT botch instead of returning
+ FAIL on some bogus values (CVE-2015-7855)
+* [Bug 2921] Password Length Memory Corruption Vulnerability (CVE-2015-7854)
+* [Bug 2920] Invalid length data provided by a custom refclock driver
+ could cause a buffer overflow (CVE-2015-7853)
+* [Bug 2919] ntpq atoascii() potential memory corruption (CVE-2015-7852)
+* [Bug 2918] saveconfig Directory Traversal Vulnerability. (OpenVMS)
+ (CVE-2015-7851)
+* [Bug 2916] trusted key use-after-free (CVE-2015-7849)
+* [Bug 2901] Clients that receive a KoD should validate the origin
+ timestamp field (CVE-2015-7704, CVE-2015-7705)
+
+Additionally the NTPsec team is aware of the following vulnerabilities
+impacting autokey: CVE-2015-7691, CVE-2015-7692, CVE-2015-7702. NTPsec
+does not support building with autokey support and therefore is not
+exposed; the vulnerable code will not be fixed, but will be removed in
+a future release.
+
+NTPsec is not impacted by CVE-2015-7848 (mode 7 loop counter underrun)
+because ntpdc and support for mode 7 packets have been removed.
// end
diff --git a/devel/TODO b/devel/TODO
index c976557..9725d76 100644
--- a/devel/TODO
+++ b/devel/TODO
@@ -17,9 +17,6 @@
* Website contacts page needs completion. This means we need to have the
bugtracker up, and all mailing lists created.
-* Designations for fixed vulns, including CVEs, need to be added to the
- NEWS file.
-
=== Build system ===
* Document build files.
More information about the vc
mailing list