/contrib/ntp/NEWS

https://bitbucket.org/freebsd/freebsd-head/ · #! · 157 lines · 107 code · 50 blank · 0 comment · 0 complexity · d5357235a443a995ceece8e1187cc02d MD5 · raw file

  1. NTP 4.2.4p8 (Harlan Stenn <stenn@ntp.org>, 2009/12/08)
  2. Focus: Security Fixes
  3. Severity: HIGH
  4. This release fixes the following high-severity vulnerability:
  5. * [Sec 1331] DoS with mode 7 packets - CVE-2009-3563.
  6. See http://support.ntp.org/security for more information.
  7. NTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control utility.
  8. In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while routine NTP time
  9. transfers use modes 1 through 5. Upon receipt of an incorrect mode 7
  10. request or a mode 7 error response from an address which is not listed
  11. in a "restrict ... noquery" or "restrict ... ignore" statement, ntpd will
  12. reply with a mode 7 error response (and log a message). In this case:
  13. * If an attacker spoofs the source address of ntpd host A in a
  14. mode 7 response packet sent to ntpd host B, both A and B will
  15. continuously send each other error responses, for as long as
  16. those packets get through.
  17. * If an attacker spoofs an address of ntpd host A in a mode 7
  18. response packet sent to ntpd host A, A will respond to itself
  19. endlessly, consuming CPU and logging excessively.
  20. Credit for finding this vulnerability goes to Robin Park and Dmitri
  21. Vinokurov of Alcatel-Lucent.
  22. THIS IS A STRONGLY RECOMMENDED UPGRADE.
  23. ---
  24. NTP 4.2.4p7 (Harlan Stenn <stenn@ntp.org>, 2009/05/04)
  25. Focus: Security and Bug Fixes
  26. Severity: HIGH
  27. This release fixes the following high-severity vulnerability:
  28. * [Sec 1151] Remote exploit if autokey is enabled. CVE-2009-1252
  29. See http://support.ntp.org/security for more information.
  30. If autokey is enabled (if ntp.conf contains a "crypto pw whatever"
  31. line) then a carefully crafted packet sent to the machine will cause
  32. a buffer overflow and possible execution of injected code, running
  33. with the privileges of the ntpd process (often root).
  34. Credit for finding this vulnerability goes to Chris Ries of CMU.
  35. This release fixes the following low-severity vulnerabilities:
  36. * [Sec 1144] limited (two byte) buffer overflow in ntpq. CVE-2009-0159
  37. Credit for finding this vulnerability goes to Geoff Keating of Apple.
  38. * [Sec 1149] use SO_EXCLUSIVEADDRUSE on Windows
  39. Credit for finding this issue goes to Dave Hart.
  40. This release fixes a number of bugs and adds some improvements:
  41. * Improved logging
  42. * Fix many compiler warnings
  43. * Many fixes and improvements for Windows
  44. * Adds support for AIX 6.1
  45. * Resolves some issues under MacOS X and Solaris
  46. THIS IS A STRONGLY RECOMMENDED UPGRADE.
  47. ---
  48. NTP 4.2.4p6 (Harlan Stenn <stenn@ntp.org>, 2009/01/07)
  49. Focus: Security Fix
  50. Severity: Low
  51. This release fixes oCERT.org's CVE-2009-0021, a vulnerability affecting
  52. the OpenSSL library relating to the incorrect checking of the return
  53. value of EVP_VerifyFinal function.
  54. Credit for finding this issue goes to the Google Security Team for
  55. finding the original issue with OpenSSL, and to ocert.org for finding
  56. the problem in NTP and telling us about it.
  57. This is a recommended upgrade.
  58. ---
  59. NTP 4.2.4p5 (Harlan Stenn <stenn@ntp.org>, 2008/08/17)
  60. Focus: Minor Bugfixes
  61. This release fixes a number of Windows-specific ntpd bugs and
  62. platform-independent ntpdate bugs. A logging bugfix has been applied
  63. to the ONCORE driver.
  64. The "dynamic" keyword and is now obsolete and deferred binding to local
  65. interfaces is the new default. The minimum time restriction for the
  66. interface update interval has been dropped.
  67. A number of minor build system and documentation fixes are included.
  68. This is a recommended upgrade for Windows.
  69. ---
  70. NTP 4.2.4p4 (Harlan Stenn <stenn@ntp.org>, 2007/09/10)
  71. Focus: Minor Bugfixes
  72. This release updates certain copyright information, fixes several display
  73. bugs in ntpdc, avoids SIGIO interrupting malloc(), cleans up file descriptor
  74. shutdown in the parse refclock driver, removes some lint from the code,
  75. stops accessing certain buffers immediately after they were freed, fixes
  76. a problem with non-command-line specification of -6, and allows the loopback
  77. interface to share addresses with other interfaces.
  78. ---
  79. NTP 4.2.4p3 (Harlan Stenn <stenn@ntp.org>, 2007/06/29)
  80. Focus: Minor Bugfixes
  81. This release fixes a bug in Windows that made it difficult to
  82. terminate ntpd under windows.
  83. This is a recommended upgrade for Windows.
  84. ---
  85. NTP 4.2.4p2 (Harlan Stenn <stenn@ntp.org>, 2007/06/19)
  86. Focus: Minor Bugfixes
  87. This release fixes a multicast mode authentication problem,
  88. an error in NTP packet handling on Windows that could lead to
  89. ntpd crashing, and several other minor bugs. Handling of
  90. multicast interfaces and logging configuration were improved.
  91. The required versions of autogen and libopts were incremented.
  92. This is a recommended upgrade for Windows and multicast users.
  93. ---
  94. NTP 4.2.4 (Harlan Stenn <stenn@ntp.org>, 2006/12/31)
  95. Focus: enhancements and bug fixes.
  96. Dynamic interface rescanning was added to simplify the use of ntpd in
  97. conjunction with DHCP. GNU AutoGen is used for its command-line options
  98. processing. Separate PPS devices are supported for PARSE refclocks, MD5
  99. signatures are now provided for the release files. Drivers have been
  100. added for some new ref-clocks and have been removed for some older
  101. ref-clocks. This release also includes other improvements, documentation
  102. and bug fixes.
  103. K&R C is no longer supported as of NTP-4.2.4. We are now aiming for ANSI
  104. C support.
  105. ---
  106. NTP 4.2.0 (Harlan Stenn <stenn@ntp.org>, 2003/10/15)
  107. Focus: enhancements and bug fixes.