1--- 2NTP 4.2.8p15 (Harlan Stenn <stenn@ntp.org>, 2020 Jun 23) 3 4Focus: Security, Bug fixes 5 6Severity: MEDIUM 7 8This release fixes one vulnerability: Associations that use CMAC 9authentication between ntpd from versions 4.2.8p11/4.3.97 and 104.2.8p14/4.3.100 will leak a small amount of memory for each packet. 11Eventually, ntpd will run out of memory and abort. 12 13It also fixes 13 other bugs. 14 15* [Sec 3661] memory leak with AES128CMAC keys <perlinger@ntp.org> 16* [Bug 3670] Regression from bad merger between 3592 and 3596 <perlinger@> 17 - Thanks to Sylar Tao 18* [Bug 3667] decodenetnum fails with numeric port <perlinger@ntp.org> 19 - rewrite 'decodenetnum()' in terms of inet_pton 20* [Bug 3666] avoid unlimited receive buffer allocation <perlinger@ntp.org> 21 - limit number of receive buffers, with an iron reserve for refclocks 22* [Bug 3664] Enable openSSL CMAC support on Windows <burnicki@ntp.org> 23* [Bug 3662] Fix build errors on Windows with VS2008 <burnicki@ntp.org> 24* [Bug 3660] Manycast orphan mode startup discovery problem. <stenn@ntp.org> 25 - integrated patch from Charles Claggett 26* [Bug 3659] Move definition of psl[] from ntp_config.h to 27 ntp_config.h <perlinger@ntp.org> 28* [Bug 3657] Wrong "Autokey group mismatch" debug message <perlinger@ntp.org> 29* [Bug 3655] ntpdc memstats hash counts <perlinger@ntp.org> 30 - fix by Gerry garvey 31* [Bug 3653] Refclock jitter RMS calculation <perlinger@ntp.org> 32 - thanks to Gerry Garvey 33* [Bug 3646] Avoid sync with unsync orphan <perlinger@ntp.org> 34 - patch by Gerry Garvey 35* [Bug 3644] Unsynchronized server [...] selected as candidate <perlinger@ntp.org> 36* [Bug 3639] refclock_jjy: TS-JJY0x can skip time sync depending on the STUS reply. <abe@ntp.org> 37 - applied patch by Takao Abe 38 39--- 40NTP 4.2.8p14 (Harlan Stenn <stenn@ntp.org>, 2020 Mar 03) 41 42Focus: Security, Bug fixes, enhancements. 43 44Severity: MEDIUM 45 46This release fixes three vulnerabilities: a bug that causes causes an ntpd 47instance that is explicitly configured to override the default and allow 48ntpdc (mode 7) connections to be made to a server to read some uninitialized 49memory; fixes the case where an unmonitored ntpd using an unauthenticated 50association to its servers may be susceptible to a forged packet DoS attack; 51and fixes an attack against a client instance that uses a single 52unauthenticated time source. It also fixes 46 other bugs and addresses 534 other issues. 54 55* [Sec 3610] process_control() should bail earlier on short packets. stenn@ 56 - Reported by Philippe Antoine 57* [Sec 3596] Highly predictable timestamp attack. <stenn@ntp.org> 58 - Reported by Miroslav Lichvar 59* [Sec 3592] DoS attack on client ntpd <perlinger@ntp.org> 60 - Reported by Miroslav Lichvar 61* [Bug 3637] Emit the version of ntpd in saveconfig. stenn@ 62* [Bug 3636] NMEA: combine time/date from multiple sentences <perlinger@ntp.org> 63* [Bug 3635] Make leapsecond file hash check optional <perlinger@ntp.org> 64* [Bug 3634] Typo in discipline.html, reported by Jason Harrison. stenn@ 65* [Bug 3628] raw DCF decoding - improve robustness with Zeller's congruence 66 - implement Zeller's congruence in libparse and libntp <perlinger@ntp.org> 67* [Bug 3627] SIGSEGV on FreeBSD-12 with stack limit and stack gap <perlinger@ntp.org> 68 - integrated patch by Cy Schubert 69* [Bug 3620] memory leak in ntpq sysinfo <perlinger@ntp.org> 70 - applied patch by Gerry Garvey 71* [Bug 3619] Honour drefid setting in cooked mode and sysinfo <perlinger@ntp.org> 72 - applied patch by Gerry Garvey 73* [Bug 3617] Add support for ACE III and Copernicus II receivers <perlinger@ntp.org> 74 - integrated patch by Richard Steedman 75* [Bug 3615] accelerate refclock startup <perlinger@ntp.org> 76* [Bug 3613] Propagate noselect to mobilized pool servers <stenn@ntp.org> 77 - Reported by Martin Burnicki 78* [Bug 3612] Use-of-uninitialized-value in receive function <perlinger@ntp.org> 79 - Reported by Philippe Antoine 80* [Bug 3611] NMEA time interpreted incorrectly <perlinger@ntp.org> 81 - officially document new "trust date" mode bit for NMEA driver 82 - restore the (previously undocumented) "trust date" feature lost with [bug 3577] 83* [Bug 3609] Fixing wrong falseticker in case of non-statistic jitter <perlinger@ntp.org> 84 - mostly based on a patch by Michael Haardt, implementing 'fudge minjitter' 85* [Bug 3608] libparse fails to compile on S11.4SRU13 and later <perlinger@ntp.org> 86 - removed ffs() and fls() prototypes as per Brian Utterback 87* [Bug 3604] Wrong param byte order passing into record_raw_stats() in 88 ntp_io.c <perlinger@ntp.org> 89 - fixed byte and paramter order as suggested by wei6410@sina.com 90* [Bug 3601] Tests fail to link on platforms with ntp_cv_gc_sections_runs=no <perlinger@ntp.org> 91* [Bug 3599] Build fails on linux-m68k due to alignment issues <perlinger@ntp.org> 92 - added padding as suggested by John Paul Adrian Glaubitz 93* [Bug 3594] ntpd discards messages coming through nmead <perlinger@ntp.org> 94* [Bug 3593] ntpd discards silently nmea messages after the 5th string <perlinger@ntp.org> 95* [Bug 3590] Update refclock_oncore.c to the new GPS date API <perlinger@ntp.org> 96* [Bug 3585] Unity tests mix buffered and unbuffered output <perlinger@ntp.org> 97 - stdout+stderr are set to line buffered during test setup now 98* [Bug 3583] synchronization error <perlinger@ntp.org> 99 - set clock to base date if system time is before that limit 100* [Bug 3582] gpsdjson refclock fudgetime1 adjustment is doubled <perlinger@ntp.org> 101* [Bug 3580] Possible bug ntpq-subs (NULL dereference in dogetassoc) <perlinger@ntp.org> 102 - Reported by Paulo Neves 103* [Bug 3577] Update refclock_zyfer.c to the new GPS date API <perlinger@ntp.org> 104 - also updates for refclock_nmea.c and refclock_jupiter.c 105* [Bug 3576] New GPS date function API <perlinger@ntp.org> 106* [Bug 3573] nptdate: missleading error message <perlinger@ntp.org> 107* [Bug 3570] NMEA driver docs: talker ID not mentioned, typo <perlinger@ntp.org> 108* [Bug 3569] cleanup MOD_NANO/STA_NANO handling for 'ntpadjtimex()' <perlinger@ntp.org> 109 - sidekick: service port resolution in 'ntpdate' 110* [Bug 3550] Reproducible build: Respect SOURCE_DATE_EPOCH <perlinger@ntp.org> 111 - applied patch by Douglas Royds 112* [Bug 3542] ntpdc monlist parameters cannot be set <perlinger@ntp.org> 113* [Bug 3533] ntpdc peer_info ipv6 issues <perlinger@ntp.org> 114 - applied patch by Gerry Garvey 115* [Bug 3531] make check: test-decodenetnum fails <perlinger@ntp.org> 116 - try to harden 'decodenetnum()' against 'getaddrinfo()' errors 117 - fix wrong cond-compile tests in unit tests 118* [Bug 3517] Reducing build noise <perlinger@ntp.org> 119* [Bug 3516] Require tooling from this decade <perlinger@ntp.org> 120 - patch by Philipp Prindeville 121* [Bug 3515] Refactor ntpdmain() dispatcher loop and group common code <perlinger@ntp.org> 122 - patch by Philipp Prindeville 123* [Bug 3511] Get rid of AC_LANG_SOURCE() warnings <perlinger@ntp.org> 124 - patch by Philipp Prindeville 125* [Bug 3510] Flatten out the #ifdef nesting in ntpdmain() <perlinger@ntp.org> 126 - partial application of patch by Philipp Prindeville 127* [Bug 3491] Signed values of LFP datatypes should always display a sign 128 - applied patch by Gerry Garvey & fixed unit tests <perlinger@ntp.org> 129* [Bug 3490] Patch to support Trimble Resolution Receivers <perlinger@ntp.org> 130 - applied (modified) patch by Richard Steedman 131* [Bug 3473] RefID of refclocks should always be text format <perlinger@ntp.org> 132 - applied patch by Gerry Garvey (with minor formatting changes) 133* [Bug 3132] Building 4.2.8p8 with disabled local libopts fails <perlinger@ntp.org> 134 - applied patch by Miroslav Lichvar 135* [Bug 3094] ntpd trying to listen for broadcasts on a completely ipv6 network 136 <perlinger@ntp.org> 137* [Bug 2420] ntpd doesn't run and exits with retval 0 when invalid user 138 is specified with -u <perlinger@ntp.org> 139 - monitor daemon child startup & propagate exit codes 140* [Bug 1433] runtime check whether the kernel really supports capabilities 141 - (modified) patch by Kurt Roeckx <perlinger@ntp.org> 142* Clean up sntp/networking.c:sendpkt() error message. <stenn@ntp.org> 143* Provide more detail on unrecognized config file parser tokens. <stenn@ntp.org> 144* Startup log improvements. <stenn@ntp.org> 145* Update the copyright year. 146 147--- 148NTP 4.2.8p13 (Harlan Stenn <stenn@ntp.org>, 2019 Mar 07) 149 150Focus: Security, Bug fixes, enhancements. 151 152Severity: MEDIUM 153 154This release fixes a bug that allows an attacker with access to an 155explicitly trusted source to send a crafted malicious mode 6 (ntpq) 156packet that can trigger a NULL pointer dereference, crashing ntpd. 157It also provides 17 other bugfixes and 1 other improvement: 158 159* [Sec 3565] Crafted null dereference attack in authenticated 160 mode 6 packet <perlinger@ntp.org> 161 - reported by Magnus Stubman 162* [Bug 3560] Fix build when HAVE_DROPROOT is not defined <perlinger@ntp.org> 163 - applied patch by Ian Lepore 164* [Bug 3558] Crash and integer size bug <perlinger@ntp.org> 165 - isolate and fix linux/windows specific code issue 166* [Bug 3556] ntp_loopfilter.c snprintf compilation warnings <perlinger@ntp.org> 167 - provide better function for incremental string formatting 168* [Bug 3555] Tidy up print alignment of debug output from ntpdate <perlinger@ntp.org> 169 - applied patch by Gerry Garvey 170* [Bug 3554] config revoke stores incorrect value <perlinger@ntp.org> 171 - original finding by Gerry Garvey, additional cleanup needed 172* [Bug 3549] Spurious initgroups() error message <perlinger@ntp.org> 173 - patch by Christous Zoulas 174* [Bug 3548] Signature not verified on windows system <perlinger@ntp.org> 175 - finding by Chen Jiabin, plus another one by me 176* [Bug 3541] patch to fix STA_NANO struct timex units <perlinger@ntp.org> 177 - applied patch by Maciej Szmigiero 178* [Bug 3540] Cannot set minsane to 0 anymore <perlinger@ntp.org> 179 - applied patch by Andre Charbonneau 180* [Bug 3539] work_fork build fails when droproot is not supported <perlinger@ntp.org> 181 - applied patch by Baruch Siach 182* [Bug 3538] Build fails for no-MMU targets <perlinger@ntp.org> 183 - applied patch by Baruch Siach 184* [Bug 3535] libparse won't handle GPS week rollover <perlinger@ntp.org> 185 - refactored handling of GPS era based on 'tos basedate' for 186 parse (TSIP) and JUPITER clocks 187* [Bug 3529] Build failures on Mac OS X 10.13 (High Sierra) <perlinger@ntp.org> 188 - patch by Daniel J. Luke; this does not fix a potential linker 189 regression issue on MacOS. 190* [Bug 3527 - Backward Incompatible] mode7 clockinfo fudgeval2 packet 191 anomaly <perlinger@ntp.org>, reported by GGarvey. 192 - --enable-bug3527-fix support by HStenn 193* [Bug 3526] Incorrect poll interval in packet <perlinger@ntp.org> 194 - applied patch by Gerry Garvey 195* [Bug 3471] Check for openssl/[ch]mac.h. <perlinger@ntp.org> 196 - added missing check, reported by Reinhard Max <perlinger@ntp.org> 197* [Bug 1674] runtime crashes and sync problems affecting both x86 and x86_64 198 - this is a variant of [bug 3558] and should be fixed with it 199* Implement 'configure --disable-signalled-io' 200 201-- 202NTP 4.2.8p12 (Harlan Stenn <stenn@ntp.org>, 2018/14/09) 203 204Focus: Security, Bug fixes, enhancements. 205 206Severity: MEDIUM 207 208This release fixes a "hole" in the noepeer capability introduced to ntpd 209in ntp-4.2.8p11, and a buffer overflow in the openhost() function used by 210ntpq and ntpdc. It also provides 26 other bugfixes, and 4 other improvements: 211 212* [Sec 3505] Buffer overflow in the openhost() call of ntpq and ntpdc. 213 214* [Sec 3012] Fix a hole in the new "noepeer" processing. 215 216* Bug Fixes: 217 [Bug 3521] Fix a logic bug in the INVALIDNAK checks. <stenn@ntp.org> 218 [Bug 3509] Add support for running as non-root on FreeBSD, Darwin, 219 other TrustedBSD platforms 220 - applied patch by Ian Lepore <perlinger@ntp.org> 221 [Bug 3506] Service Control Manager interacts poorly with NTPD <perlinger@ntp.org> 222 - changed interaction with SCM to signal pending startup 223 [Bug 3486] Buffer overflow in ntpq/ntpq.c:tstflags() <perlinger@ntp.org> 224 - applied patch by Gerry Garvey 225 [Bug 3485] Undefined sockaddr used in error messages in ntp_config.c <perlinger@ntp.org> 226 - applied patch by Gerry Garvey 227 [Bug 3484] ntpq response from ntpd is incorrect when REFID is null <perlinger@ntp.org> 228 - rework of ntpq 'nextvar()' key/value parsing 229 [Bug 3482] Fixes for compilation warnings (ntp_io.c & ntpq-subs.c) <perlinger@ntp.org> 230 - applied patch by Gerry Garvey (with mods) 231 [Bug 3480] Refclock sample filter not cleared on clock STEP <perlinger@ntp.org> 232 - applied patch by Gerry Garvey 233 [Bug 3479] ctl_putrefid() allows unsafe characters through to ntpq <perlinger@ntp.org> 234 - applied patch by Gerry Garvey (with mods) 235 [Bug 3476]ctl_putstr() sends empty unquoted string [...] <perlinger@ntp.org> 236 - applied patch by Gerry Garvey (with mods); not sure if that's bug or feature, though 237 [Bug 3475] modify prettydate() to suppress output of zero time <perlinger@ntp.org> 238 - applied patch by Gerry Garvey 239 [Bug 3474] Missing pmode in mode7 peer info response <perlinger@ntp.org> 240 - applied patch by Gerry Garvey 241 [Bug 3471] Check for openssl/[ch]mac.h. HStenn. 242 - add #define ENABLE_CMAC support in configure. HStenn. 243 [Bug 3470] ntpd4.2.8p11 fails to compile without OpenSSL <perlinger@ntp.org> 244 [Bug 3469] Incomplete string compare [...] in is_refclk_addr <perlinger@ntp.org> 245 - patch by Stephen Friedl 246 [Bug 3467] Potential memory fault in ntpq [...] <perlinger@ntp.org> 247 - fixed IO redirection and CTRL-C handling in ntq and ntpdc 248 [Bug 3465] Default TTL values cannot be used <perlinger@ntp.org> 249 [Bug 3461] refclock_shm.c: clear error status on clock recovery <perlinger@ntp.org> 250 - initial patch by Hal Murray; also fixed refclock_report() trouble 251 [Bug 3460] Fix typo in ntpq.texi, reported by Kenyon Ralph. <stenn@ntp.org> 252 [Bug 3456] Use uintptr_t rather than size_t to store an integer in a pointer 253 - According to Brooks Davis, there was only one location <perlinger@ntp.org> 254 [Bug 3449] ntpq - display "loop" instead of refid [...] <perlinger@ntp.org> 255 - applied patch by Gerry Garvey 256 [Bug 3445] Symmetric peer won't sync on startup <perlinger@ntp.org> 257 - applied patch by Gerry Garvey 258 [Bug 3442] Fixes for ntpdate as suggested by Gerry Garvey, 259 with modifications 260 New macro REFID_ISTEXT() which is also used in ntpd/ntp_control.c. 261 [Bug 3434] ntpd clears STA_UNSYNC on start <perlinger@ntp.org> 262 - applied patch by Miroslav Lichvar 263 [Bug 3426] ntpdate.html -t default is 2 seconds. Leonid Evdokimov. 264 [Bug 3121] Drop root privileges for the forked DNS worker <perlinger@ntp.org> 265 - integrated patch by Reinhard Max 266 [Bug 2821] minor build issues <perlinger@ntp.org> 267 - applied patches by Christos Zoulas, including real bug fixes 268 html/authopt.html: cleanup, from <stenn@ntp.org> 269 ntpd/ntpd.c: DROPROOT cleanup. <stenn@ntp.org> 270 Symmetric key range is 1-65535. Update docs. <stenn@ntp.org> 271 272-- 273NTP 4.2.8p11 (Harlan Stenn <stenn@ntp.org>, 2018/02/27) 274 275Focus: Security, Bug fixes, enhancements. 276 277Severity: MEDIUM 278 279This release fixes 2 low-/medium-, 1 informational/medum-, and 2 low-severity 280vulnerabilities in ntpd, one medium-severity vulernability in ntpq, and 281provides 65 other non-security fixes and improvements: 282 283* NTP Bug 3454: Unauthenticated packet can reset authenticated interleaved 284 association (LOW/MED) 285 Date Resolved: Stable (4.2.8p11) 27 Feb 2018 286 References: Sec 3454 / CVE-2018-7185 / VU#961909 287 Affects: ntp-4.2.6, up to but not including ntp-4.2.8p11. 288 CVSS2: MED 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P) This could score between 289 2.9 and 6.8. 290 CVSS3: LOW 3.1 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L This could 291 score between 2.6 and 3.1 292 Summary: 293 The NTP Protocol allows for both non-authenticated and 294 authenticated associations, in client/server, symmetric (peer), 295 and several broadcast modes. In addition to the basic NTP 296 operational modes, symmetric mode and broadcast servers can 297 support an interleaved mode of operation. In ntp-4.2.8p4 a bug 298 was inadvertently introduced into the protocol engine that 299 allows a non-authenticated zero-origin (reset) packet to reset 300 an authenticated interleaved peer association. If an attacker 301 can send a packet with a zero-origin timestamp and the source 302 IP address of the "other side" of an interleaved association, 303 the 'victim' ntpd will reset its association. The attacker must 304 continue sending these packets in order to maintain the 305 disruption of the association. In ntp-4.0.0 thru ntp-4.2.8p6, 306 interleave mode could be entered dynamically. As of ntp-4.2.8p7, 307 interleaved mode must be explicitly configured/enabled. 308 Mitigation: 309 Implement BCP-38. 310 Upgrade to 4.2.8p11, or later, from the NTP Project Download Page 311 or the NTP Public Services Project Download Page. 312 If you are unable to upgrade to 4.2.8p11 or later and have 313 'peer HOST xleave' lines in your ntp.conf file, remove the 314 'xleave' option. 315 Have enough sources of time. 316 Properly monitor your ntpd instances. 317 If ntpd stops running, auto-restart it without -g . 318 Credit: 319 This weakness was discovered by Miroslav Lichvar of Red Hat. 320 321* NTP Bug 3453: Interleaved symmetric mode cannot recover from bad 322 state (LOW/MED) 323 Date Resolved: Stable (4.2.8p11) 27 Feb 2018 324 References: Sec 3453 / CVE-2018-7184 / VU#961909 325 Affects: ntpd in ntp-4.2.8p4, up to but not including ntp-4.2.8p11. 326 CVSS2: MED 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 327 Could score between 2.9 and 6.8. 328 CVSS3: LOW 3.1 - CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L 329 Could score between 2.6 and 6.0. 330 Summary: 331 The fix for NtpBug2952 was incomplete, and while it fixed one 332 problem it created another. Specifically, it drops bad packets 333 before updating the "received" timestamp. This means a 334 third-party can inject a packet with a zero-origin timestamp, 335 meaning the sender wants to reset the association, and the 336 transmit timestamp in this bogus packet will be saved as the 337 most recent "received" timestamp. The real remote peer does 338 not know this value and this will disrupt the association until 339 the association resets. 340 Mitigation: 341 Implement BCP-38. 342 Upgrade to ntp-4.2.8p11 or later from the NTP Project Download Page 343 or the NTP Public Services Project Download Page. 344 Use authentication with 'peer' mode. 345 Have enough sources of time. 346 Properly monitor your ntpd instances. 347 If ntpd stops running, auto-restart it without -g . 348 Credit: 349 This weakness was discovered by Miroslav Lichvar of Red Hat. 350 351* NTP Bug 3415: Provide a way to prevent authenticated symmetric passive 352 peering (LOW) 353 Date Resolved: Stable (4.2.8p11) 27 Feb 2018 354 References: Sec 3415 / CVE-2018-7170 / VU#961909 355 Sec 3012 / CVE-2016-1549 / VU#718152 356 Affects: All ntp-4 releases up to, but not including 4.2.8p7, and 357 4.3.0 up to, but not including 4.3.92. Resolved in 4.2.8p11. 358 CVSS2: LOW 3.5 - (AV:N/AC:M/Au:S/C:N/I:P/A:N) 359 CVSS3: LOW 3.1 - CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N 360 Summary: 361 ntpd can be vulnerable to Sybil attacks. If a system is set up to 362 use a trustedkey and if one is not using the feature introduced in 363 ntp-4.2.8p6 allowing an optional 4th field in the ntp.keys file to 364 specify which IPs can serve time, a malicious authenticated peer 365 -- i.e. one where the attacker knows the private symmetric key -- 366 can create arbitrarily-many ephemeral associations in order to win 367 the clock selection of ntpd and modify a victim's clock. Three 368 additional protections are offered in ntp-4.2.8p11. One is the 369 new 'noepeer' directive, which disables symmetric passive 370 ephemeral peering. Another is the new 'ippeerlimit' directive, 371 which limits the number of peers that can be created from an IP. 372 The third extends the functionality of the 4th field in the 373 ntp.keys file to include specifying a subnet range. 374 Mitigation: 375 Implement BCP-38. 376 Upgrade to ntp-4.2.8p11 or later from the NTP Project Download Page 377 or the NTP Public Services Project Download Page. 378 Use the 'noepeer' directive to prohibit symmetric passive 379 ephemeral associations. 380 Use the 'ippeerlimit' directive to limit the number of peers 381 that can be created from an IP. 382 Use the 4th argument in the ntp.keys file to limit the IPs and 383 subnets that can be time servers. 384 Have enough sources of time. 385 Properly monitor your ntpd instances. 386 If ntpd stops running, auto-restart it without -g . 387 Credit: 388 This weakness was reported as Bug 3012 by Matthew Van Gundy of 389 Cisco ASIG, and separately by Stefan Moser as Bug 3415. 390 391* ntpq Bug 3414: decodearr() can write beyond its 'buf' limits (Medium) 392 Date Resolved: 27 Feb 2018 393 References: Sec 3414 / CVE-2018-7183 / VU#961909 394 Affects: ntpq in ntp-4.2.8p6, up to but not including ntp-4.2.8p11. 395 CVSS2: MED 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 396 CVSS3: MED 5.0 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L 397 Summary: 398 ntpq is a monitoring and control program for ntpd. decodearr() 399 is an internal function of ntpq that is used to -- wait for it -- 400 decode an array in a response string when formatted data is being 401 displayed. This is a problem in affected versions of ntpq if a 402 maliciously-altered ntpd returns an array result that will trip this 403 bug, or if a bad actor is able to read an ntpq request on its way to 404 a remote ntpd server and forge and send a response before the remote 405 ntpd sends its response. It's potentially possible that the 406 malicious data could become injectable/executable code. 407 Mitigation: 408 Implement BCP-38. 409 Upgrade to ntp-4.2.8p11 or later from the NTP Project Download Page 410 or the NTP Public Services Project Download Page. 411 Credit: 412 This weakness was discovered by Michael Macnair of Thales e-Security. 413 414* NTP Bug 3412: ctl_getitem(): buffer read overrun leads to undefined 415 behavior and information leak (Info/Medium) 416 Date Resolved: 27 Feb 2018 417 References: Sec 3412 / CVE-2018-7182 / VU#961909 418 Affects: ntp-4.2.8p6, up to but not including ntp-4.2.8p11. 419 CVSS2: INFO 0.0 - MED 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 0.0 if C:N 420 CVSS3: NONE 0.0 - MED 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N 421 0.0 if C:N 422 Summary: 423 ctl_getitem() is used by ntpd to process incoming mode 6 packets. 424 A malicious mode 6 packet can be sent to an ntpd instance, and 425 if the ntpd instance is from 4.2.8p6 thru 4.2.8p10, that will 426 cause ctl_getitem() to read past the end of its buffer. 427 Mitigation: 428 Implement BCP-38. 429 Upgrade to ntp-4.2.8p11 or later from the NTP Project Download Page 430 or the NTP Public Services Project Download Page. 431 Have enough sources of time. 432 Properly monitor your ntpd instances. 433 If ntpd stops running, auto-restart it without -g . 434 Credit: 435 This weakness was discovered by Yihan Lian of Qihoo 360. 436 437* NTP Bug 3012: Sybil vulnerability: ephemeral association attack 438 Also see Bug 3415, above. 439 Date Mitigated: Stable (4.2.8p7) 26 Apr 2016; Dev (4.3.92) 26 Apr 2016 440 Date Resolved: Stable (4.2.8p11) 27 Feb 2018 441 References: Sec 3012 / CVE-2016-1549 / VU#718152 442 Affects: All ntp-4 releases up to, but not including 4.2.8p7, and 443 4.3.0 up to, but not including 4.3.92. Resolved in 4.2.8p11. 444 CVSS2: LOW 3.5 - (AV:N/AC:M/Au:S/C:N/I:P/A:N) 445 CVSS3: MED 5.3 - CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N 446 Summary: 447 ntpd can be vulnerable to Sybil attacks. If a system is set up 448 to use a trustedkey and if one is not using the feature 449 introduced in ntp-4.2.8p6 allowing an optional 4th field in the 450 ntp.keys file to specify which IPs can serve time, a malicious 451 authenticated peer -- i.e. one where the attacker knows the 452 private symmetric key -- can create arbitrarily-many ephemeral 453 associations in order to win the clock selection of ntpd and 454 modify a victim's clock. Two additional protections are 455 offered in ntp-4.2.8p11. One is the 'noepeer' directive, which 456 disables symmetric passive ephemeral peering. The other extends 457 the functionality of the 4th field in the ntp.keys file to 458 include specifying a subnet range. 459 Mitigation: 460 Implement BCP-38. 461 Upgrade to 4.2.8p11, or later, from the NTP Project Download Page or 462 the NTP Public Services Project Download Page. 463 Use the 'noepeer' directive to prohibit symmetric passive 464 ephemeral associations. 465 Use the 'ippeerlimit' directive to limit the number of peer 466 associations from an IP. 467 Use the 4th argument in the ntp.keys file to limit the IPs 468 and subnets that can be time servers. 469 Properly monitor your ntpd instances. 470 Credit: 471 This weakness was discovered by Matthew Van Gundy of Cisco ASIG. 472 473* Bug fixes: 474 [Bug 3457] OpenSSL FIPS mode regression <perlinger@ntp.org> 475 [Bug 3455] ntpd doesn't use scope id when binding multicast <perlinger@ntp.org> 476 - applied patch by Sean Haugh 477 [Bug 3452] PARSE driver prints uninitialized memory. <perlinger@ntp.org> 478 [Bug 3450] Dubious error messages from plausibility checks in get_systime() 479 - removed error log caused by rounding/slew, ensured postcondition <perlinger@ntp.org> 480 [Bug 3447] AES-128-CMAC (fixes) <perlinger@ntp.org> 481 - refactoring the MAC code, too 482 [Bug 3441] Validate the assumption that AF_UNSPEC is 0. stenn@ntp.org 483 [Bug 3439] When running multiple commands / hosts in ntpq... <perlinger@ntp.org> 484 - applied patch by ggarvey 485 [Bug 3438] Negative values and values > 999 days in... <perlinger@ntp.org> 486 - applied patch by ggarvey (with minor mods) 487 [Bug 3437] ntpd tries to open socket with AF_UNSPEC domain 488 - applied patch (with mods) by Miroslav Lichvar <perlinger@ntp.org> 489 [Bug 3435] anchor NTP era alignment <perlinger@ntp.org> 490 [Bug 3433] sntp crashes when run with -a. <stenn@ntp.org> 491 [Bug 3430] ntpq dumps core (SIGSEGV) for "keytype md2" 492 - fixed several issues with hash algos in ntpd, sntp, ntpq, 493 ntpdc and the test suites <perlinger@ntp.org> 494 [Bug 3424] Trimble Thunderbolt 1024 week millenium bug <perlinger@ntp.org> 495 - initial patch by Daniel Pouzzner 496 [Bug 3423] QNX adjtime() implementation error checking is 497 wrong <perlinger@ntp.org> 498 [Bug 3417] ntpq ifstats packet counters can be negative 499 made IFSTATS counter quantities unsigned <perlinger@ntp.org> 500 [Bug 3411] problem about SIGN(6) packet handling for ntp-4.2.8p10 501 - raised receive buffer size to 1200 <perlinger@ntp.org> 502 [Bug 3408] refclock_jjy.c: Avoid a wrong report of the coverity static 503 analysis tool. <abe@ntp.org> 504 [Bug 3405] update-leap.in: general cleanup, HTTPS support. Paul McMath. 505 [Bug 3404] Fix openSSL DLL usage under Windows <perlinger@ntp.org> 506 - fix/drop assumptions on OpenSSL libs directory layout 507 [Bug 3399] NTP: linker error in 4.2.8p10 during Linux cross-compilation 508 - initial patch by timeflies@mail2tor.com <perlinger@ntp.org> 509 [Bug 3398] tests fail with core dump <perlinger@ntp.org> 510 - patch contributed by Alexander Bluhm 511 [Bug 3397] ctl_putstr() asserts that data fits in its buffer 512 rework of formatting & data transfer stuff in 'ntp_control.c' 513 avoids unecessary buffers and size limitations. <perlinger@ntp.org> 514 [Bug 3394] Leap second deletion does not work on ntpd clients 515 - fixed handling of dynamic deletion w/o leap file <perlinger@ntp.org> 516 [Bug 3391] ntpd segfaults on startup due to small warmup thread stack size 517 - increased mimimum stack size to 32kB <perlinger@ntp.org> 518 [Bug 3367] Faulty LinuxPPS NMEA clock support in 4.2.8 <perlinger@ntp.org> 519 - reverted handling of PPS kernel consumer to 4.2.6 behavior 520 [Bug 3365] Updates driver40(-ja).html and miscopt.html <abe@ntp.org> 521 [Bug 3358] Spurious KoD log messages in .INIT. phase. HStenn. 522 [Bug 3016] wrong error position reported for bad ":config pool" 523 - fixed location counter & ntpq output <perlinger@ntp.org> 524 [Bug 2900] libntp build order problem. HStenn. 525 [Bug 2878] Tests are cluttering up syslog <perlinger@ntp.org> 526 [Bug 2737] Wrong phone number listed for USNO. ntp-bugs@bodosom.net, 527 perlinger@ntp.org 528 [Bug 2557] Fix Thunderbolt init. ntp-bugs@bodosom.net, perlinger@ntp. 529 [Bug 948] Trustedkey config directive leaks memory. <perlinger@ntp.org> 530 Use strlcpy() to copy strings, not memcpy(). HStenn. 531 Typos. HStenn. 532 test_ntp_scanner_LDADD needs ntpd/ntp_io.o. HStenn. 533 refclock_jjy.c: Add missing "%s" to an msyslog() call. HStenn. 534 Build ntpq and libntpq.a with NTP_HARD_*FLAGS. perlinger@ntp.org 535 Fix trivial warnings from 'make check'. perlinger@ntp.org 536 Fix bug in the override portion of the compiler hardening macro. HStenn. 537 record_raw_stats(): Log entire packet. Log writes. HStenn. 538 AES-128-CMAC support. BInglis, HStenn, JPerlinger. 539 sntp: tweak key file logging. HStenn. 540 sntp: pkt_output(): Improve debug output. HStenn. 541 update-leap: updates from Paul McMath. 542 When using pkg-config, report --modversion. HStenn. 543 Clean up libevent configure checks. HStenn. 544 sntp: show the IP of who sent us a crypto-NAK. HStenn. 545 Allow .../N to specify subnet bits for IPs in ntp.keys. HStenn, JPerlinger. 546 authistrustedip() - use it in more places. HStenn, JPerlinger. 547 New sysstats: sys_lamport, sys_tsrounding. HStenn. 548 Update ntp.keys .../N documentation. HStenn. 549 Distribute testconf.yml. HStenn. 550 Add DPRINTF(2,...) lines to receive() for packet drops. HStenn. 551 Rename the configuration flag fifo variables. HStenn. 552 Improve saveconfig output. HStenn. 553 Decode restrict flags on receive() debug output. HStenn. 554 Decode interface flags on receive() debug output. HStenn. 555 Warn the user if deprecated "driftfile name WanderThreshold" is used. HStenn. 556 Update the documentation in ntp.conf.def . HStenn. 557 restrictions() must return restrict flags and ippeerlimit. HStenn. 558 Update ntpq peer documentation to describe the 'p' type. HStenn. 559 Rename restrict 'flags' to 'rflags. Use an enum for the values. HStenn. 560 Provide dump_restricts() for debugging. HStenn. 561 Use consistent 4th arg type for [gs]etsockopt. JPerlinger. 562 563* Other items: 564 565* update-leap needs the following perl modules: 566 Net::SSLeay 567 IO::Socket::SSL 568 569* New sysstats variables: sys_lamport, sys_tsrounding 570See them with: ntpq -c "rv 0 ss_lamport,ss_tsrounding" 571sys_lamport counts the number of observed Lamport violations, while 572sys_tsrounding counts observed timestamp rounding events. 573 574* New ntp.conf items: 575 576- restrict ... noepeer 577- restrict ... ippeerlimit N 578 579The 'noepeer' directive will disallow all ephemeral/passive peer 580requests. 581 582The 'ippeerlimit' directive limits the number of time associations 583for each IP in the designated set of addresses. This limit does not 584apply to explicitly-configured associations. A value of -1, the current 585default, means an unlimited number of associations may connect from a 586single IP. 0 means "none", etc. Ordinarily the only way multiple 587associations would come from the same IP would be if the remote side 588was using a proxy. But a trusted machine might become compromised, 589in which case an attacker might spin up multiple authenticated sessions 590from different ports. This directive should be helpful in this case. 591 592* New ntp.keys feature: Each IP in the optional list of IPs in the 4th 593field may contain a /subnetbits specification, which identifies the 594scope of IPs that may use this key. This IP/subnet restriction can be 595used to limit the IPs that may use the key in most all situations where 596a key is used. 597-- 598NTP 4.2.8p10 (Harlan Stenn <stenn@ntp.org>, 2017/03/21) 599 600Focus: Security, Bug fixes, enhancements. 601 602Severity: MEDIUM 603 604This release fixes 5 medium-, 6 low-, and 4 informational-severity 605vulnerabilities, and provides 15 other non-security fixes and improvements: 606 607* NTP-01-016 NTP: Denial of Service via Malformed Config (Medium) 608 Date Resolved: 21 Mar 2017 609 References: Sec 3389 / CVE-2017-6464 / VU#325339 610 Affects: All versions of NTP-4, up to but not including ntp-4.2.8p10, and 611 ntp-4.3.0 up to, but not including ntp-4.3.94. 612 CVSS2: MED 4.6 (AV:N/AC:H/Au:M/C:N/I:N/A:C) 613 CVSS3: MED 4.2 CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H 614 Summary: 615 A vulnerability found in the NTP server makes it possible for an 616 authenticated remote user to crash ntpd via a malformed mode 617 configuration directive. 618 Mitigation: 619 Implement BCP-38. 620 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page or 621 the NTP Public Services Project Download Page 622 Properly monitor your ntpd instances, and auto-restart 623 ntpd (without -g) if it stops running. 624 Credit: 625 This weakness was discovered by Cure53. 626 627* NTP-01-014 NTP: Buffer Overflow in DPTS Clock (Low) 628 Date Resolved: 21 Mar 2017 629 References: Sec 3388 / CVE-2017-6462 / VU#325339 630 Affects: All versions of NTP, up to but not including ntp-4.2.8p10, and ntp-4.3.0 up to, but not including ntp-4.3.94. 631 CVSS2: Low 1.0 (AV:L/AC:H/Au:S/C:N/I:N/A:P) 632 CVSS3: Low 1.6 CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:L 633 Summary: 634 There is a potential for a buffer overflow in the legacy Datum 635 Programmable Time Server refclock driver. Here the packets are 636 processed from the /dev/datum device and handled in 637 datum_pts_receive(). Since an attacker would be required to 638 somehow control a malicious /dev/datum device, this does not 639 appear to be a practical attack and renders this issue "Low" in 640 terms of severity. 641 Mitigation: 642 If you have a Datum reference clock installed and think somebody 643 may maliciously change the device, upgrade to 4.2.8p10, or 644 later, from the NTP Project Download Page or the NTP Public 645 Services Project Download Page 646 Properly monitor your ntpd instances, and auto-restart 647 ntpd (without -g) if it stops running. 648 Credit: 649 This weakness was discovered by Cure53. 650 651* NTP-01-012 NTP: Authenticated DoS via Malicious Config Option (Medium) 652 Date Resolved: 21 Mar 2017 653 References: Sec 3387 / CVE-2017-6463 / VU#325339 654 Affects: All versions of ntp, up to but not including ntp-4.2.8p10, and 655 ntp-4.3.0 up to, but not including ntp-4.3.94. 656 CVSS2: MED 4.6 (AV:N/AC:H/Au:M/C:N/I:N/A:C) 657 CVSS3: MED 4.2 CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H 658 Summary: 659 A vulnerability found in the NTP server allows an authenticated 660 remote attacker to crash the daemon by sending an invalid setting 661 via the :config directive. The unpeer option expects a number or 662 an address as an argument. In case the value is "0", a 663 segmentation fault occurs. 664 Mitigation: 665 Implement BCP-38. 666 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page 667 or the NTP Public Services Project Download Page 668 Properly monitor your ntpd instances, and auto-restart 669 ntpd (without -g) if it stops running. 670 Credit: 671 This weakness was discovered by Cure53. 672 673* NTP-01-011 NTP: ntpq_stripquotes() returns incorrect value (Informational) 674 Date Resolved: 21 Mar 2017 675 References: Sec 3386 676 Affects: All versions of NTP, up to but not including ntp-4.2.8p10, and 677 ntp-4.3.0 up to, but not including ntp-4.3.94. 678 CVSS2: None 0.0 (AV:N/AC:H/Au:N/C:N/I:N/A:N) 679 CVSS3: None 0.0 CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:N 680 Summary: 681 The NTP Mode 6 monitoring and control client, ntpq, uses the 682 function ntpq_stripquotes() to remove quotes and escape characters 683 from a given string. According to the documentation, the function 684 is supposed to return the number of copied bytes but due to 685 incorrect pointer usage this value is always zero. Although the 686 return value of this function is never used in the code, this 687 flaw could lead to a vulnerability in the future. Since relying 688 on wrong return values when performing memory operations is a 689 dangerous practice, it is recommended to return the correct value 690 in accordance with the documentation pertinent to the code. 691 Mitigation: 692 Implement BCP-38. 693 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page 694 or the NTP Public Services Project Download Page 695 Properly monitor your ntpd instances, and auto-restart 696 ntpd (without -g) if it stops running. 697 Credit: 698 This weakness was discovered by Cure53. 699 700* NTP-01-010 NTP: ereallocarray()/eallocarray() underused (Info) 701 Date Resolved: 21 Mar 2017 702 References: Sec 3385 703 Affects: All versions of NTP, up to but not including ntp-4.2.8p10, and 704 ntp-4.3.0 up to, but not including ntp-4.3.94. 705 Summary: 706 NTP makes use of several wrappers around the standard heap memory 707 allocation functions that are provided by libc. This is mainly 708 done to introduce additional safety checks concentrated on 709 several goals. First, they seek to ensure that memory is not 710 accidentally freed, secondly they verify that a correct amount 711 is always allocated and, thirdly, that allocation failures are 712 correctly handled. There is an additional implementation for 713 scenarios where memory for a specific amount of items of the 714 same size needs to be allocated. The handling can be found in 715 the oreallocarray() function for which a further number-of-elements 716 parameter needs to be provided. Although no considerable threat 717 was identified as tied to a lack of use of this function, it is 718 recommended to correctly apply oreallocarray() as a preferred 719 option across all of the locations where it is possible. 720 Mitigation: 721 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page 722 or the NTP Public Services Project Download Page 723 Credit: 724 This weakness was discovered by Cure53. 725 726* NTP-01-009 NTP: Privileged execution of User Library code (WINDOWS 727 PPSAPI ONLY) (Low) 728 Date Resolved: 21 Mar 2017 729 References: Sec 3384 / CVE-2017-6455 / VU#325339 730 Affects: All Windows versions of ntp-4 that use the PPSAPI, up to but 731 not including ntp-4.2.8p10, and ntp-4.3.0 up to, but not 732 including ntp-4.3.94. 733 CVSS2: MED 3.8 (AV:L/AC:H/Au:S/C:N/I:N/A:C) 734 CVSS3: MED 4.0 CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H 735 Summary: 736 The Windows NT port has the added capability to preload DLLs 737 defined in the inherited global local environment variable 738 PPSAPI_DLLS. The code contained within those libraries is then 739 called from the NTPD service, usually running with elevated 740 privileges. Depending on how securely the machine is setup and 741 configured, if ntpd is configured to use the PPSAPI under Windows 742 this can easily lead to a code injection. 743 Mitigation: 744 Implement BCP-38. 745 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page 746 or the NTP Public Services Project Download Page 747 Credit: 748 This weakness was discovered by Cure53. 749 750* NTP-01-008 NTP: Stack Buffer Overflow from Command Line (WINDOWS 751 installer ONLY) (Low) 752 Date Resolved: 21 Mar 2017 753 References: Sec 3383 / CVE-2017-6452 / VU#325339 754 Affects: WINDOWS installer ONLY: All versions of the ntp-4 Windows 755 installer, up to but not including ntp-4.2.8p10, and ntp-4.3.0 up 756 to, but not including ntp-4.3.94. 757 CVSS2: Low 1.0 (AV:L/AC:H/Au:S/C:N/I:N/A:P) 758 CVSS3: Low 1.8 CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:L 759 Summary: 760 The Windows installer for NTP calls strcat(), blindly appending 761 the string passed to the stack buffer in the addSourceToRegistry() 762 function. The stack buffer is 70 bytes smaller than the buffer 763 in the calling main() function. Together with the initially 764 copied Registry path, the combination causes a stack buffer 765 overflow and effectively overwrites the stack frame. The 766 passed application path is actually limited to 256 bytes by the 767 operating system, but this is not sufficient to assure that the 768 affected stack buffer is consistently protected against 769 overflowing at all times. 770 Mitigation: 771 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page 772 or the NTP Public Services Project Download Page 773 Credit: 774 This weakness was discovered by Cure53. 775 776* NTP-01-007 NTP: Data Structure terminated insufficiently (WINDOWS 777 installer ONLY) (Low) 778 Date Resolved: 21 Mar 2017 779 References: Sec 3382 / CVE-2017-6459 / VU#325339 780 Affects: WINDOWS installer ONLY: All ntp-4 versions of the Windows 781 installer, up to but not including ntp-4.2.8p10, and ntp-4.3.0 782 up to, but not including ntp-4.3.94. 783 CVSS2: Low 1.0 (AV:L/AC:H/Au:S/C:N/I:N/A:P) 784 CVSS3: Low 1.8 CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:L 785 Summary: 786 The Windows installer for NTP calls strcpy() with an argument 787 that specifically contains multiple null bytes. strcpy() only 788 copies a single terminating null character into the target 789 buffer instead of copying the required double null bytes in the 790 addKeysToRegistry() function. As a consequence, a garbage 791 registry entry can be created. The additional arsize parameter 792 is erroneously set to contain two null bytes and the following 793 call to RegSetValueEx() claims to be passing in a multi-string 794 value, though this may not be true. 795 Mitigation: 796 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page 797 or the NTP Public Services Project Download Page 798 Credit: 799 This weakness was discovered by Cure53. 800 801* NTP-01-006 NTP: Copious amounts of Unused Code (Informational) 802 References: Sec 3381 803 Summary: 804 The report says: Statically included external projects 805 potentially introduce several problems and the issue of having 806 extensive amounts of code that is "dead" in the resulting binary 807 must clearly be pointed out. The unnecessary unused code may or 808 may not contain bugs and, quite possibly, might be leveraged for 809 code-gadget-based branch-flow redirection exploits. Analogically, 810 having source trees statically included as well means a failure 811 in taking advantage of the free feature for periodical updates. 812 This solution is offered by the system's Package Manager. The 813 three libraries identified are libisc, libevent, and libopts. 814 Resolution: 815 For libisc, we already only use a portion of the original library. 816 We've found and fixed bugs in the original implementation (and 817 offered the patches to ISC), and plan to see what has changed 818 since we last upgraded the code. libisc is generally not 819 installed, and when it it we usually only see the static libisc.a 820 file installed. Until we know for sure that the bugs we've found 821 and fixed are fixed upstream, we're better off with the copy we 822 are using. 823 824 Version 1 of libevent was the only production version available 825 until recently, and we've been requiring version 2 for a long time. 826 But if the build system has at least version 2 of libevent 827 installed, we'll use the version that is installed on the system. 828 Otherwise, we provide a copy of libevent that we know works. 829 830 libopts is provided by GNU AutoGen, and that library and package 831 undergoes frequent API version updates. The version of autogen 832 used to generate the tables for the code must match the API 833 version in libopts. AutoGen can be ... difficult to build and 834 install, and very few developers really need it. So we have it 835 on our build and development machines, and we provide the 836 specific version of the libopts code in the distribution to make 837 sure that the proper API version of libopts is available. 838 839 As for the point about there being code in these libraries that 840 NTP doesn't use, OK. But other packages used these libraries as 841 well, and it is reasonable to assume that other people are paying 842 attention to security and code quality issues for the overall 843 libraries. It takes significant resources to analyze and 844 customize these libraries to only include what we need, and to 845 date we believe the cost of this effort does not justify the benefit. 846 Credit: 847 This issue was discovered by Cure53. 848 849* NTP-01-005 NTP: Off-by-one in Oncore GPS Receiver (Low) 850 Date Resolved: 21 Mar 2017 851 References: Sec 3380 852 Affects: All versions of NTP, up to but not including ntp-4.2.8p10, and 853 ntp-4.3.0 up to, but not including ntp-4.3.94. 854 CVSS2: None 0.0 (AV:L/AC:H/Au:N/C:N/I:N/A:N) 855 CVSS3: None 0.0 CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N 856 Summary: 857 There is a fencepost error in a "recovery branch" of the code for 858 the Oncore GPS receiver if the communication link to the ONCORE 859 is weak / distorted and the decoding doesn't work. 860 Mitigation: 861 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page or 862 the NTP Public Services Project Download Page 863 Properly monitor your ntpd instances, and auto-restart 864 ntpd (without -g) if it stops running. 865 Credit: 866 This weakness was discovered by Cure53. 867 868* NTP-01-004 NTP: Potential Overflows in ctl_put() functions (Medium) 869 Date Resolved: 21 Mar 2017 870 References: Sec 3379 / CVE-2017-6458 / VU#325339 871 Affects: All versions of NTP, up to but not including ntp-4.2.8p10, and 872 ntp-4.3.0 up to, but not including ntp-4.3.94. 873 CVSS2: MED 4.6 (AV:N/AC:H/Au:M/C:N/I:N/A:C) 874 CVSS3: MED 4.2 CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H 875 Summary: 876 ntpd makes use of different wrappers around ctl_putdata() to 877 create name/value ntpq (mode 6) response strings. For example, 878 ctl_putstr() is usually used to send string data (variable names 879 or string data). The formatting code was missing a length check 880 for variable names. If somebody explicitly created any unusually 881 long variable names in ntpd (longer than 200-512 bytes, depending 882 on the type of variable), then if any of these variables are 883 added to the response list it would overflow a buffer. 884 Mitigation: 885 Implement BCP-38. 886 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page 887 or the NTP Public Services Project Download Page 888 If you don't want to upgrade, then don't setvar variable names 889 longer than 200-512 bytes in your ntp.conf file. 890 Properly monitor your ntpd instances, and auto-restart 891 ntpd (without -g) if it stops running. 892 Credit: 893 This weakness was discovered by Cure53. 894 895* NTP-01-003 NTP: Improper use of snprintf() in mx4200_send() (Low) 896 Date Resolved: 21 Mar 2017 897 References: Sec 3378 / CVE-2017-6451 / VU#325339 898 Affects: All versions of NTP, up to but not including ntp-4.2.8p10, and 899 ntp-4.3.0 up to, but not including ntp-4.3.94. 900 CVSS2: LOW 0.8 (AV:L/AC:H/Au:M/C:N/I:N/A:P) 901 CVSS3: LOW 1.8 CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N 902 Summary: 903 The legacy MX4200 refclock is only built if is specifically 904 enabled, and furthermore additional code changes are required to 905 compile and use it. But it uses the libc functions snprintf() 906 and vsnprintf() incorrectly, which can lead to an out-of-bounds 907 memory write due to an improper handling of the return value of 908 snprintf()/vsnprintf(). Since the return value is used as an 909 iterator and it can be larger than the buffer's size, it is 910 possible for the iterator to point somewhere outside of the 911 allocated buffer space. This results in an out-of-bound memory 912 write. This behavior can be leveraged to overwrite a saved 913 instruction pointer on the stack and gain control over the 914 execution flow. During testing it was not possible to identify 915 any malicious usage for this vulnerability. Specifically, no 916 way for an attacker to exploit this vulnerability was ultimately 917 unveiled. However, it has the potential to be exploited, so the 918 code should be fixed. 919 Mitigation, if you have a Magnavox MX4200 refclock: 920 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page 921 or the NTP Public Services Project Download Page. 922 Properly monitor your ntpd instances, and auto-restart 923 ntpd (without -g) if it stops running. 924 Credit: 925 This weakness was discovered by Cure53. 926 927* NTP-01-002 NTP: Buffer Overflow in ntpq when fetching reslist from a 928 malicious ntpd (Medium) 929 Date Resolved: 21 Mar 2017 930 References: Sec 3377 / CVE-2017-6460 / VU#325339 931 Affects: All versions of ntpq, up to but not including ntp-4.2.8p10, and 932 ntp-4.3.0 up to, but not including ntp-4.3.94. 933 CVSS2: MED 4.9 (AV:N/AC:H/Au:S/C:N/I:N/A:C) 934 CVSS3: MED 4.2 CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H 935 Summary: 936 A stack buffer overflow in ntpq can be triggered by a malicious 937 ntpd server when ntpq requests the restriction list from the server. 938 This is due to a missing length check in the reslist() function. 939 It occurs whenever the function parses the server's response and 940 encounters a flagstr variable of an excessive length. The string 941 will be copied into a fixed-size buffer, leading to an overflow on 942 the function's stack-frame. Note well that this problem requires 943 a malicious server, and affects ntpq, not ntpd. 944 Mitigation: 945 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page 946 or the NTP Public Services Project Download Page 947 If you can't upgrade your version of ntpq then if you want to know 948 the reslist of an instance of ntpd that you do not control, 949 know that if the target ntpd is malicious that it can send back 950 a response that intends to crash your ntpq process. 951 Credit: 952 This weakness was discovered by Cure53. 953 954* NTP-01-001 NTP: Makefile does not enforce Security Flags (Informational) 955 Date Resolved: 21 Mar 2017 956 References: Sec 3376 957 Affects: All versions of NTP, up to but not including ntp-4.2.8p10, and 958 ntp-4.3.0 up to, but not including ntp-4.3.94. 959 CVSS2: N/A 960 CVSS3: N/A 961 Summary: 962 The build process for NTP has not, by default, provided compile 963 or link flags to offer "hardened" security options. Package 964 maintainers have always been able to provide hardening security 965 flags for their builds. As of ntp-4.2.8p10, the NTP build 966 system has a way to provide OS-specific hardening flags. Please 967 note that this is still not a really great solution because it 968 is specific to NTP builds. It's inefficient to have every 969 package supply, track and maintain this information for every 970 target build. It would be much better if there was a common way 971 for OSes to provide this information in a way that arbitrary 972 packages could benefit from it. 973 Mitigation: 974 Implement BCP-38. 975 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page 976 or the NTP Public Services Project Download Page 977 Properly monitor your ntpd instances, and auto-restart 978 ntpd (without -g) if it stops running. 979 Credit: 980 This weakness was reported by Cure53. 981 982* 0rigin DoS (Medium) 983 Date Resolved: 21 Mar 2017 984 References: Sec 3361 / CVE-2016-9042 / VU#325339 985 Affects: ntp-4.2.8p9 (21 Nov 2016), up to but not including ntp-4.2.8p10 986 CVSS2: MED 4.9 (AV:N/AC:H/Au:N/C:N/I:N/A:C) (worst case) 987 CVSS3: MED 4.4 CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H (worst case) 988 Summary: 989 An exploitable denial of service vulnerability exists in the 990 origin timestamp check functionality of ntpd 4.2.8p9. A specially 991 crafted unauthenticated network packet can be used to reset the 992 expected origin timestamp for target peers. Legitimate replies 993 from targeted peers will fail the origin timestamp check (TEST2) 994 causing the reply to be dropped and creating a denial of service 995 condition. This vulnerability can only be exploited if the 996 attacker can spoof all of the servers. 997 Mitigation: 998 Implement BCP-38. 999 Configure enough servers/peers that an attacker cannot target 1000 all of your time sources. 1001 Upgrade to 4.2.8p10, or later, from the NTP Project Download Page 1002 or the NTP Public Services Project Download Page 1003 Properly monitor your ntpd instances, and auto-restart 1004 ntpd (without -g) if it stops running. 1005 Credit: 1006 This weakness was discovered by Matthew Van Gundy of Cisco. 1007 1008Other fixes: 1009 1010* [Bug 3393] clang scan-build findings <perlinger@ntp.org> 1011* [Bug 3363] Support for openssl-1.1.0 without compatibility modes 1012 - rework of patch set from <ntp.org@eroen.eu>. <perlinger@ntp.org> 1013* [Bug 3356] Bugfix 3072 breaks multicastclient <perlinger@ntp.org> 1014* [Bug 3216] libntp audio ioctl() args incorrectly cast to int 1015 on 4.4BSD-Lite derived platforms <perlinger@ntp.org> 1016 - original patch by Majdi S. Abbas 1017* [Bug 3215] 'make distcheck' fails with new BK repo format <perlinger@ntp.org> 1018* [Bug 3173] forking async worker: interrupted pipe I/O <perlinger@ntp.org> 1019 - initial patch by Christos Zoulas 1020* [Bug 3139] (...) time_pps_create: Exec format error <perlinger@ntp.org> 1021 - move loader API from 'inline' to proper source 1022 - augment pathless dlls with absolute path to NTPD 1023 - use 'msyslog()' instead of 'printf() 'for reporting trouble 1024* [Bug 3107] Incorrect Logic for Peer Event Limiting <perlinger@ntp.org> 1025 - applied patch by Matthew Van Gundy 1026* [Bug 3065] Quiet warnings on NetBSD <perlinger@ntp.org> 1027 - applied some of the patches provided by Havard. Not all of them 1028 still match the current code base, and I did not touch libopt. 1029* [Bug 3062] Change the process name of forked DNS worker <perlinger@ntp.org> 1030 - applied patch by Reinhard Max. See bugzilla for limitations. 1031* [Bug 2923] Trap Configuration Fail <perlinger@ntp.org> 1032 - fixed dependency inversion from [Bug 2837] 1033* [Bug 2896] Nothing happens if minsane < maxclock < minclock 1034 - produce ERROR log message about dysfunctional daemon. <perlinger@ntp.org> 1035* [Bug 2851] allow -4/-6 on restrict line with mask <perlinger@ntp.org> 1036 - applied patch by Miroslav Lichvar for ntp4.2.6 compat 1037* [Bug 2645] out-of-bound pointers in ctl_putsys and decode_bitflags 1038 - Fixed these and some more locations of this pattern. 1039 Probably din't get them all, though. <perlinger@ntp.org> 1040* Update copyright year. 1041 1042-- 1043(4.2.8p9-win) 2017/02/01 Released by Harlan Stenn <stenn@ntp.org> 1044 1045* [Bug 3144] NTP does not build without openSSL. <perlinger@ntp.org> 1046 - added missed changeset for automatic openssl lib detection 1047 - fixed some minor warning issues 1048* [Bug 3095] More compatibility with openssl 1.1. <perlinger@ntp.org> 1049* configure.ac cleanup. stenn@ntp.org 1050* openssl configure cleanup. stenn@ntp.org 1051 1052-- 1053NTP 4.2.8p9 (Harlan Stenn <stenn@ntp.org>, 2016/11/21) 1054 1055Focus: Security, Bug fixes, enhancements. 1056 1057Severity: HIGH 1058 1059In addition to bug fixes and enhancements, this release fixes the 1060following 1 high- (Windows only), 2 medium-, 2 medium-/low, and 10615 low-severity vulnerabilities, and provides 28 other non-security 1062fixes and improvements: 1063 1064* Trap crash 1065 Date Resolved: 21 November 2016; Dev (4.3.94) 21 November 2016 1066 References: Sec 3119 / CVE-2016-9311 / VU#633847 1067 Affects: ntp-4.0.90 (21 July 1999), possibly earlier, up to but not 1068 including 4.2.8p9, and ntp-4.3.0 up to but not including ntp-4.3.94. 1069 CVSS2: MED 4.9 (AV:N/AC:H/Au:N/C:N/I:N/A:C) 1070 CVSS3: MED 4.4 CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H 1071 Summary: 1072 ntpd does not enable trap service by default. If trap service 1073 has been explicitly enabled, an attacker can send a specially 1074 crafted packet to cause a null pointer dereference that will 1075 crash ntpd, resulting in a denial of service. 1076 Mitigation: 1077 Implement BCP-38. 1078 Use "restrict default noquery ..." in your ntp.conf file. Only 1079 allow mode 6 queries from trusted networks and hosts. 1080 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page 1081 or the NTP Public Services Project Download Page 1082 Properly monitor your ntpd instances, and auto-restart ntpd 1083 (without -g) if it stops running. 1084 Credit: This weakness was discovered by Matthew Van Gundy of Cisco. 1085 1086* Mode 6 information disclosure and DDoS vector 1087 Date Resolved: 21 November 2016; Dev (4.3.94) 21 November 2016 1088 References: Sec 3118 / CVE-2016-9310 / VU#633847 1089 Affects: ntp-4.0.90 (21 July 1999), possibly earlier, up to but not 1090 including 4.2.8p9, and ntp-4.3.0 up to but not including ntp-4.3.94. 1091 CVSS2: MED 6.4 (AV:A/AC:L/Au:N/C:N/I:N/A:P) 1092 CVSS3: MED 6.5 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L 1093 Summary: 1094 An exploitable configuration modification vulnerability exists 1095 in the control mode (mode 6) functionality of ntpd. If, against 1096 long-standing BCP recommendations, "restrict default noquery ..." 1097 is not specified, a specially crafted control mode packet can set 1098 ntpd traps, providing information disclosure and DDoS 1099 amplification, and unset ntpd traps, disabling legitimate 1100 monitoring. A remote, unauthenticated, network attacker can 1101 trigger this vulnerability. 1102 Mitigation: 1103 Implement BCP-38. 1104 Use "restrict default noquery ..." in your ntp.conf file. 1105 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page 1106 or the NTP Public Services Project Download Page 1107 Properly monitor your ntpd instances, and auto-restart ntpd 1108 (without -g) if it stops running. 1109 Credit: This weakness was discovered by Matthew Van Gundy of Cisco. 1110 1111* Broadcast Mode Replay Prevention DoS 1112 Date Resolved: 21 November 2016; Dev (4.3.94) 21 November 2016 1113 References: Sec 3114 / CVE-2016-7427 / VU#633847 1114 Affects: ntp-4.2.8p6, up to but not including ntp-4.2.8p9, and 1115 ntp-4.3.90 up to, but not including ntp-4.3.94. 1116 CVSS2: LOW 3.3 (AV:A/AC:L/Au:N/C:N/I:N/A:P) 1117 CVSS3: MED 4.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L 1118 Summary: 1119 The broadcast mode of NTP is expected to only be used in a 1120 trusted network. If the broadcast network is accessible to an 1121 attacker, a potentially exploitable denial of service 1122 vulnerability in ntpd's broadcast mode replay prevention 1123 functionality can be abused. An attacker with access to the NTP 1124 broadcast domain can periodically inject specially crafted 1125 broadcast mode NTP packets into the broadcast domain which, 1126 while being logged by ntpd, can cause ntpd to reject broadcast 1127 mode packets from legitimate NTP broadcast servers. 1128 Mitigation: 1129 Implement BCP-38. 1130 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page 1131 or the NTP Public Services Project Download Page 1132 Properly monitor your ntpd instances, and auto-restart ntpd 1133 (without -g) if it stops running. 1134 Credit: This weakness was discovered by Matthew Van Gundy of Cisco. 1135 1136* Broadcast Mode Poll Interval Enforcement DoS 1137 Date Resolved: 21 November 2016; Dev (4.3.94) 21 November 2016 1138 References: Sec 3113 / CVE-2016-7428 / VU#633847 1139 Affects: ntp-4.2.8p6, up to but not including ntp-4.2.8p9, and 1140 ntp-4.3.90 up to, but not including ntp-4.3.94 1141 CVSS2: LOW 3.3 (AV:A/AC:L/Au:N/C:N/I:N/A:P) 1142 CVSS3: MED 4.3 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L 1143 Summary: 1144 The broadcast mode of NTP is expected to only be used in a 1145 trusted network. If the broadcast network is accessible to an 1146 attacker, a potentially exploitable denial of service 1147 vulnerability in ntpd's broadcast mode poll interval enforcement 1148 functionality can be abused. To limit abuse, ntpd restricts the 1149 rate at which each broadcast association will process incoming 1150 packets. ntpd will reject broadcast mode packets that arrive 1151 before the poll interval specified in the preceding broadcast 1152 packet expires. An attacker with access to the NTP broadcast 1153 domain can send specially crafted broadcast mode NTP packets to 1154 the broadcast domain which, while being logged by ntpd, will 1155 cause ntpd to reject broadcast mode packets from legitimate NTP 1156 broadcast servers. 1157 Mitigation: 1158 Implement BCP-38. 1159 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page 1160 or the NTP Public Services Project Download Page 1161 Properly monitor your ntpd instances, and auto-restart ntpd 1162 (without -g) if it stops running. 1163 Credit: This weakness was discovered by Matthew Van Gundy of Cisco. 1164 1165* Windows: ntpd DoS by oversized UDP packet 1166 Date Resolved: 21 November 2016; Dev (4.3.94) 21 November 2016 1167 References: Sec 3110 / CVE-2016-9312 / VU#633847 1168 Affects Windows only: ntp-4.?.?, up to but not including ntp-4.2.8p9, 1169 and ntp-4.3.0 up to, but not including ntp-4.3.94. 1170 CVSS2: HIGH 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C) 1171 CVSS3: HIGH 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 1172 Summary: 1173 If a vulnerable instance of ntpd on Windows receives a crafted 1174 malicious packet that is "too big", ntpd will stop working. 1175 Mitigation: 1176 Implement BCP-38. 1177 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page 1178 or the NTP Public Services Project Download Page 1179 Properly monitor your ntpd instances, and auto-restart ntpd 1180 (without -g) if it stops running. 1181 Credit: This weakness was discovered by Robert Pajak of ABB. 1182 1183* 0rigin (zero origin) issues 1184 Date Resolved: 21 November 2016; Dev (4.3.94) 21 November 2016 1185 References: Sec 3102 / CVE-2016-7431 / VU#633847 1186 Affects: ntp-4.2.8p8, and ntp-4.3.93. 1187 CVSS2: MED 5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 1188 CVSS3: MED 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N 1189 Summary: 1190 Zero Origin timestamp problems were fixed by Bug 2945 in 1191 ntp-4.2.8p6. However, subsequent timestamp validation checks 1192 introduced a regression in the handling of some Zero origin 1193 timestamp checks. 1194 Mitigation: 1195 Implement BCP-38. 1196 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page 1197 or the NTP Public Services Project Download Page 1198 Properly monitor your ntpd instances, and auto-restart ntpd 1199 (without -g) if it stops running. 1200 Credit: This weakness was discovered by Sharon Goldberg and Aanchal 1201 Malhotra of Boston University. 1202 1203* read_mru_list() does inadequate incoming packet checks 1204 Date Resolved: 21 November 2016; Dev (4.3.94) 21 November 2016 1205 References: Sec 3082 / CVE-2016-7434 / VU#633847 1206 Affects: ntp-4.2.7p22, up to but not including ntp-4.2.8p9, and 1207 ntp-4.3.0 up to, but not including ntp-4.3.94. 1208 CVSS2: LOW 3.8 (AV:L/AC:H/Au:S/C:N/I:N/A:C) 1209 CVSS3: LOW 3.8 CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H 1210 Summary: 1211 If ntpd is configured to allow mrulist query requests from a 1212 server that sends a crafted malicious packet, ntpd will crash 1213 on receipt of that crafted malicious mrulist query packet. 1214 Mitigation: 1215 Only allow mrulist query packets from trusted hosts. 1216 Implement BCP-38. 1217 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page 1218 or the NTP Public Services Project Download Page 1219 Properly monitor your ntpd instances, and auto-restart ntpd 1220 (without -g) if it stops running. 1221 Credit: This weakness was discovered by Magnus Stubman. 1222 1223* Attack on interface selection 1224 Date Resolved: 21 November 2016; Dev (4.3.94) 21 November 2016 1225 References: Sec 3072 / CVE-2016-7429 / VU#633847 1226 Affects: ntp-4.2.7p385, up to but not including ntp-4.2.8p9, and 1227 ntp-4.3.0 up to, but not including ntp-4.3.94 1228 CVSS2: LOW 1.0 (AV:L/AC:H/Au:S/C:N/I:N/A:P) 1229 CVSS3: LOW 1.6 CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:L 1230 Summary: 1231 When ntpd receives a server response on a socket that corresponds 1232 to a different interface than was used for the request, the peer 1233 structure is updated to use the interface for new requests. If 1234 ntpd is running on a host with multiple interfaces in separate 1235 networks and the operating system doesn't check source address in 1236 received packets (e.g. rp_filter on Linux is set to 0), an 1237 attacker that knows the address of the source can send a packet 1238 with spoofed source address which will cause ntpd to select wrong 1239 interface for the source and prevent it from sending new requests 1240 until the list of interfaces is refreshed, which happens on 1241 routing changes or every 5 minutes by default. If the attack is 1242 repeated often enough (once per second), ntpd will not be able to 1243 synchronize with the source. 1244 Mitigation: 1245 Implement BCP-38. 1246 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page 1247 or the NTP Public Services Project Download Page 1248 If you are going to configure your OS to disable source address 1249 checks, also configure your firewall configuration to control 1250 what interfaces can receive packets from what networks. 1251 Properly monitor your ntpd instances, and auto-restart ntpd 1252 (without -g) if it stops running. 1253 Credit: This weakness was discovered by Miroslav Lichvar of Red Hat. 1254 1255* Client rate limiting and server responses 1256 Date Resolved: 21 November 2016; Dev (4.3.94) 21 November 2016 1257 References: Sec 3071 / CVE-2016-7426 / VU#633847 1258 Affects: ntp-4.2.5p203, up to but not including ntp-4.2.8p9, and 1259 ntp-4.3.0 up to, but not including ntp-4.3.94 1260 CVSS2: LOW 1.0 (AV:L/AC:H/Au:S/C:N/I:N/A:P) 1261 CVSS3: LOW 1.6 CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:L 1262 Summary: 1263 When ntpd is configured with rate limiting for all associations 1264 (restrict default limited in ntp.conf), the limits are applied 1265 also to responses received from its configured sources. An 1266 attacker who knows the sources (e.g., from an IPv4 refid in 1267 server response) and knows the system is (mis)configured in this 1268 way can periodically send packets with spoofed source address to 1269 keep the rate limiting activated and prevent ntpd from accepting 1270 valid responses from its sources. 1271 1272 While this blanket rate limiting can be useful to prevent 1273 brute-force attacks on the origin timestamp, it allows this DoS 1274 attack. Similarly, it allows the attacker to prevent mobilization 1275 of ephemeral associations. 1276 Mitigation: 1277 Implement BCP-38. 1278 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page 1279 or the NTP Public Services Project Download Page 1280 Properly monitor your ntpd instances, and auto-restart ntpd 1281 (without -g) if it stops running. 1282 Credit: This weakness was discovered by Miroslav Lichvar of Red Hat. 1283 1284* Fix for bug 2085 broke initial sync calculations 1285 Date Resolved: 21 November 2016; Dev (4.3.94) 21 November 2016 1286 References: Sec 3067 / CVE-2016-7433 / VU#633847 1287 Affects: ntp-4.2.7p385, up to but not including ntp-4.2.8p9, and 1288 ntp-4.3.0 up to, but not including ntp-4.3.94. But the 1289 root-distance calculation in general is incorrect in all versions 1290 of ntp-4 until this release. 1291 CVSS2: LOW 1.2 (AV:L/AC:H/Au:N/C:N/I:N/A:P) 1292 CVSS3: LOW 1.6 CVSS:3.0/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L 1293 Summary: 1294 Bug 2085 described a condition where the root delay was included 1295 twice, causing the jitter value to be higher than expected. Due 1296 to a misinterpretation of a small-print variable in The Book, the 1297 fix for this problem was incorrect, resulting in a root distance 1298 that did not include the peer dispersion. The calculations and 1299 formulae have been reviewed and reconciled, and the code has been 1300 updated accordingly. 1301 Mitigation: 1302 Upgrade to 4.2.8p9, or later, from the NTP Project Download Page 1303 or the NTP Public Services Project Download Page 1304 Properly monitor your ntpd instances, and auto-restart ntpd 1305 (without -g) if it stops running. 1306 Credit: This weakness was discovered independently by Brian Utterback of 1307 Oracle, and Sharon Goldberg and Aanchal Malhotra of Boston University. 1308 1309Other fixes: 1310 1311* [Bug 3142] bug in netmask prefix length detection <perlinger@ntp.org> 1312* [Bug 3138] gpsdjson refclock should honor fudgetime1. stenn@ntp.org 1313* [Bug 3129] Unknown hosts can put resolver thread into a hard loop 1314 - moved retry decision where it belongs. <perlinger@ntp.org> 1315* [Bug 3125] NTPD doesn't fully start when ntp.conf entries are out of order 1316 using the loopback-ppsapi-provider.dll <perlinger@ntp.org> 1317* [Bug 3116] unit tests for NTP time stamp expansion. <perlinger@ntp.org> 1318* [Bug 3100] ntpq can't retrieve daemon_version <perlinger@ntp.org> 1319 - fixed extended sysvar lookup (bug introduced with bug 3008 fix) 1320* [Bug 3095] Compatibility with openssl 1.1 <perlinger@ntp.org> 1321 - applied patches by Kurt Roeckx <kurt@roeckx.be> to source 1322 - added shim layer for SSL API calls with issues (both directions) 1323* [Bug 3089] Serial Parser does not work anymore for hopfser like device 1324 - simplified / refactored hex-decoding in driver. <perlinger@ntp.org> 1325* [Bug 3084] update-leap mis-parses the leapfile name. HStenn. 1326* [Bug 3068] Linker warnings when building on Solaris. perlinger@ntp.org 1327 - applied patch thanks to Andrew Stormont <andyjstormont@gmail.com> 1328* [Bug 3067] Root distance calculation needs improvement. HStenn 1329* [Bug 3066] NMEA clock ignores pps. perlinger@ntp.org 1330 - PPS-HACK works again. 1331* [Bug 3059] Potential buffer overrun from oversized hash <perlinger@ntp.org> 1332 - applied patch by Brian Utterback <brian.utterback@oracle.com> 1333* [Bug 3053] ntp_loopfilter.c frequency calc precedence error. Sarah White. 1334* [Bug 3050] Fix for bug #2960 causes [...] spurious error message. 1335 <perlinger@ntp.org> 1336 - patches by Reinhard Max <max@suse.com> and Havard Eidnes <he@uninett.no> 1337* [Bug 3047] Fix refclock_jjy C-DEX JST2000. abe@ntp.org 1338 - Patch provided by Kuramatsu. 1339* [Bug 3021] unity_fixture.c needs pragma weak <perlinger@ntp.org> 1340 - removed unnecessary & harmful decls of 'setUp()' & 'tearDown()' 1341* [Bug 3019] Windows: ERROR_HOST_UNREACHABLE block packet processing. DMayer 1342* [Bug 2998] sntp/tests/packetProcessing.c broken without openssl. JPerlinger 1343* [Bug 2961] sntp/tests/packetProcessing.c assumes AUTOKEY. HStenn. 1344* [Bug 2959] refclock_jupiter: gps week correction <perlinger@ntp.org> 1345 - fixed GPS week expansion to work based on build date. Special thanks 1346 to Craig Leres for initial patch and testing. 1347* [Bug 2951] ntpd tests fail: multiple definition of `send_via_ntp_signd' 1348 - fixed Makefile.am <perlinger@ntp.org> 1349* [Bug 2689] ATOM driver processes last PPS pulse at startup, 1350 even if it is very old <perlinger@ntp.org> 1351 - make sure PPS source is alive before processing samples 1352 - improve stability close to the 500ms phase jump (phase gate) 1353* Fix typos in include/ntp.h. 1354* Shim X509_get_signature_nid() if needed 1355* git author attribution cleanup 1356* bk ignore file cleanup 1357* remove locks in Windows IO, use rpc-like thread synchronisation instead 1358 1359--- 1360NTP 4.2.8p8 (Harlan Stenn <stenn@ntp.org>, 2016/06/02) 1361 1362Focus: Security, Bug fixes, enhancements. 1363 1364Severity: HIGH 1365 1366In addition to bug fixes and enhancements, this release fixes the 1367following 1 high- and 4 low-severity vulnerabilities: 1368 1369* CRYPTO_NAK crash 1370 Date Resolved: 02 June 2016; Dev (4.3.93) 02 June 2016 1371 References: Sec 3046 / CVE-2016-4957 / VU#321640 1372 Affects: ntp-4.2.8p7, and ntp-4.3.92. 1373 CVSS2: HIGH 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C) 1374 CVSS3: HIGH 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 1375 Summary: The fix for Sec 3007 in ntp-4.2.8p7 contained a bug that 1376 could cause ntpd to crash. 1377 Mitigation: 1378 Implement BCP-38. 1379 Upgrade to 4.2.8p8, or later, from the NTP Project Download Page 1380 or the NTP Public Services Project Download Page 1381 If you cannot upgrade from 4.2.8p7, the only other alternatives 1382 are to patch your code or filter CRYPTO_NAK packets. 1383 Properly monitor your ntpd instances, and auto-restart ntpd 1384 (without -g) if it stops running. 1385 Credit: This weakness was discovered by Nicolas Edet of Cisco. 1386 1387* Bad authentication demobilizes ephemeral associations 1388 Date Resolved: 02 June 2016; Dev (4.3.93) 02 June 2016 1389 References: Sec 3045 / CVE-2016-4953 / VU#321640 1390 Affects: ntp-4, up to but not including ntp-4.2.8p8, and 1391 ntp-4.3.0 up to, but not including ntp-4.3.93. 1392 CVSS2: LOW 2.6 (AV:N/AC:H/Au:N/C:N/I:N/A:P) 1393 CVSS3: LOW 3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L 1394 Summary: An attacker who knows the origin timestamp and can send a 1395 spoofed packet containing a CRYPTO-NAK to an ephemeral peer 1396 target before any other response is sent can demobilize that 1397 association. 1398 Mitigation: 1399 Implement BCP-38. 1400 Upgrade to 4.2.8p8, or later, from the NTP Project Download Page 1401 or the NTP Public Services Project Download Page 1402 Properly monitor your ntpd instances. 1403 Credit: This weakness was discovered by Miroslav Lichvar of Red Hat. 1404 1405* Processing spoofed server packets 1406 Date Resolved: 02 June 2016; Dev (4.3.93) 02 June 2016 1407 References: Sec 3044 / CVE-2016-4954 / VU#321640 1408 Affects: ntp-4, up to but not including ntp-4.2.8p8, and 1409 ntp-4.3.0 up to, but not including ntp-4.3.93. 1410 CVSS2: LOW 2.6 (AV:N/AC:H/Au:N/C:N/I:N/A:P) 1411 CVSS3: LOW 3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L 1412 Summary: An attacker who is able to spoof packets with correct origin 1413 timestamps from enough servers before the expected response 1414 packets arrive at the target machine can affect some peer 1415 variables and, for example, cause a false leap indication to be set. 1416 Mitigation: 1417 Implement BCP-38. 1418 Upgrade to 4.2.8p8, or later, from the NTP Project Download Page 1419 or the NTP Public Services Project Download Page 1420 Properly monitor your ntpd instances. 1421 Credit: This weakness was discovered by Jakub Prokes of Red Hat. 1422 1423* Autokey association reset 1424 Date Resolved: 02 June 2016; Dev (4.3.93) 02 June 2016 1425 References: Sec 3043 / CVE-2016-4955 / VU#321640 1426 Affects: ntp-4, up to but not including ntp-4.2.8p8, and 1427 ntp-4.3.0 up to, but not including ntp-4.3.93. 1428 CVSS2: LOW 2.6 (AV:N/AC:H/Au:N/C:N/I:N/A:P) 1429 CVSS3: LOW 3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L 1430 Summary: An attacker who is able to spoof a packet with a correct 1431 origin timestamp before the expected response packet arrives at 1432 the target machine can send a CRYPTO_NAK or a bad MAC and cause 1433 the association's peer variables to be cleared. If this can be 1434 done often enough, it will prevent that association from working. 1435 Mitigation: 1436 Implement BCP-38. 1437 Upgrade to 4.2.8p8, or later, from the NTP Project Download Page 1438 or the NTP Public Services Project Download Page 1439 Properly monitor your ntpd instances. 1440 Credit: This weakness was discovered by Miroslav Lichvar of Red Hat. 1441 1442* Broadcast interleave 1443 Date Resolved: 02 June 2016; Dev (4.3.93) 02 June 2016 1444 References: Sec 3042 / CVE-2016-4956 / VU#321640 1445 Affects: ntp-4, up to but not including ntp-4.2.8p8, and 1446 ntp-4.3.0 up to, but not including ntp-4.3.93. 1447 CVSS2: LOW 2.6 (AV:N/AC:H/Au:N/C:N/I:N/A:P) 1448 CVSS3: LOW 3.7 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L 1449 Summary: The fix for NtpBug2978 does not cover broadcast associations, 1450 so broadcast clients can be triggered to flip into interleave mode. 1451 Mitigation: 1452 Implement BCP-38. 1453 Upgrade to 4.2.8p8, or later, from the NTP Project Download Page 1454 or the NTP Public Services Project Download Page 1455 Properly monitor your ntpd instances. 1456 Credit: This weakness was discovered by Miroslav Lichvar of Red Hat. 1457 1458Other fixes: 1459* [Bug 3038] NTP fails to build in VS2015. perlinger@ntp.org 1460 - provide build environment 1461 - 'wint_t' and 'struct timespec' defined by VS2015 1462 - fixed print()/scanf() format issues 1463* [Bug 3052] Add a .gitignore file. Edmund Wong. 1464* [Bug 3054] miscopt.html documents the allan intercept in seconds. SWhite. 1465* [Bug 3058] fetch_timestamp() mishandles 64-bit alignment. Brian Utterback, 1466 JPerlinger, HStenn. 1467* Fix typo in ntp-wait and plot_summary. HStenn. 1468* Make sure we have an "author" file for git imports. HStenn. 1469* Update the sntp problem tests for MacOS. HStenn. 1470 1471--- 1472NTP 4.2.8p7 (Harlan Stenn <stenn@ntp.org>, 2016/04/26) 1473 1474Focus: Security, Bug fixes, enhancements. 1475 1476Severity: MEDIUM 1477 1478When building NTP from source, there is a new configure option 1479available, --enable-dynamic-interleave. More information on this below. 1480 1481Also note that ntp-4.2.8p7 logs more "unexpected events" than previous 1482versions of ntp. These events have almost certainly happened in the 1483past, it's just that they were silently counted and not logged. With 1484the increasing awareness around security, we feel it's better to clearly 1485log these events to help detect abusive behavior. This increased 1486logging can also help detect other problems, too. 1487 1488In addition to bug fixes and enhancements, this release fixes the 1489following 9 low- and medium-severity vulnerabilities: 1490 1491* Improve NTP security against buffer comparison timing attacks, 1492 AKA: authdecrypt-timing 1493 Date Resolved: Stable (4.2.8p7) 26 Apr 2016; Dev (4.3.92) 26 Apr 2016 1494 References: Sec 2879 / CVE-2016-1550 1495 Affects: All ntp-4 releases up to, but not including 4.2.8p7, and 1496 4.3.0 up to, but not including 4.3.92 1497 CVSSv2: LOW 2.6 - (AV:L/AC:H/Au:N/C:P/I:P/A:N) 1498 CVSSv3: MED 4.0 - CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N 1499 Summary: Packet authentication tests have been performed using 1500 memcmp() or possibly bcmp(), and it is potentially possible 1501 for a local or perhaps LAN-based attacker to send a packet with 1502 an authentication payload and indirectly observe how much of 1503 the digest has matched. 1504 Mitigation: 1505 Upgrade to 4.2.8p7, or later, from the NTP Project Download Page 1506 or the NTP Public Services Project Download Page. 1507 Properly monitor your ntpd instances. 1508 Credit: This weakness was discovered independently by Loganaden 1509 Velvindron, and Matthew Van Gundy and Stephen Gray of Cisco ASIG. 1510 1511* Zero origin timestamp bypass: Additional KoD checks. 1512 References: Sec 2945 / Sec 2901 / CVE-2015-8138 1513 Affects: All ntp-4 releases up to, but not including 4.2.8p7, 1514 Summary: Improvements to the fixes incorporated in t 4.2.8p6 and 4.3.92. 1515 1516* peer associations were broken by the fix for NtpBug2899 1517 Date Resolved: Stable (4.2.8p7) 26 Apr 2016; Dev (4.3.92) 26 Apr 2016 1518 References: Sec 2952 / CVE-2015-7704 1519 Affects: All ntp-4 releases up to, but not including 4.2.8p7, and 1520 4.3.0 up to, but not including 4.3.92 1521 CVSSv2: MED 4.3 - (AV:N/AC:M/Au:N/C:N/I:N/A:P) 1522 Summary: The fix for NtpBug2952 in ntp-4.2.8p5 to address broken peer 1523 associations did not address all of the issues. 1524 Mitigation: 1525 Implement BCP-38. 1526 Upgrade to 4.2.8p7, or later, from the NTP Project Download Page 1527 or the NTP Public Services Project Download Page 1528 If you can't upgrade, use "server" associations instead of 1529 "peer" associations. 1530 Monitor your ntpd instances. 1531 Credit: This problem was discovered by Michael Tatarinov. 1532 1533* Validate crypto-NAKs, AKA: CRYPTO-NAK DoS 1534 Date Resolved: Stable (4.2.8p7) 26 Apr 2016; Dev (4.3.92) 26 Apr 2016 1535 References: Sec 3007 / CVE-2016-1547 / VU#718152 1536 Affects: All ntp-4 releases up to, but not including 4.2.8p7, and 1537 4.3.0 up to, but not including 4.3.92 1538 CVSS2: MED 4.3 - (AV:N/AC:M/Au:N/C:N/I:N/A:P) 1539 CVSS3: MED 3.7 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L 1540 Summary: For ntp-4 versions up to but not including ntp-4.2.8p7, an 1541 off-path attacker can cause a preemptable client association to 1542 be demobilized by sending a crypto NAK packet to a victim client 1543 with a spoofed source address of an existing associated peer. 1544 This is true even if authentication is enabled. 1545 1546 Furthermore, if the attacker keeps sending crypto NAK packets, 1547 for example one every second, the victim never has a chance to 1548 reestablish the association and synchronize time with that 1549 legitimate server. 1550 1551 For ntp-4.2.8 thru ntp-4.2.8p6 there is less risk because more 1552 stringent checks are performed on incoming packets, but there 1553 are still ways to exploit this vulnerability in versions before 1554 ntp-4.2.8p7. 1555 Mitigation: 1556 Implement BCP-38. 1557 Upgrade to 4.2.8p7, or later, from the NTP Project Download Page 1558 or the NTP Public Services Project Download Page 1559 Properly monitor your ntpd instances 1560 Credit: This weakness was discovered by Stephen Gray and 1561 Matthew Van Gundy of Cisco ASIG. 1562 1563* ctl_getitem() return value not always checked 1564 Date Resolved: Stable (4.2.8p7) 26 Apr 2016; Dev (4.3.92) 26 Apr 2016 1565 References: Sec 3008 / CVE-2016-2519 1566 Affects: All ntp-4 releases up to, but not including 4.2.8p7, and 1567 4.3.0 up to, but not including 4.3.92 1568 CVSSv2: MED 4.9 - (AV:N/AC:H/Au:S/C:N/I:N/A:C) 1569 CVSSv3: MED 4.2 - CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H 1570 Summary: ntpq and ntpdc can be used to store and retrieve information 1571 in ntpd. It is possible to store a data value that is larger 1572 than the size of the buffer that the ctl_getitem() function of 1573 ntpd uses to report the return value. If the length of the 1574 requested data value returned by ctl_getitem() is too large, 1575 the value NULL is returned instead. There are 2 cases where the 1576 return value from ctl_getitem() was not directly checked to make 1577 sure it's not NULL, but there are subsequent INSIST() checks 1578 that make sure the return value is not NULL. There are no data 1579 values ordinarily stored in ntpd that would exceed this buffer 1580 length. But if one has permission to store values and one stores 1581 a value that is "too large", then ntpd will abort if an attempt 1582 is made to read that oversized value. 1583 Mitigation: 1584 Implement BCP-38. 1585 Upgrade to 4.2.8p7, or later, from the NTP Project Download Page 1586 or the NTP Public Services Project Download Page 1587 Properly monitor your ntpd instances. 1588 Credit: This weakness was discovered by Yihan Lian of the Cloud 1589 Security Team, Qihoo 360. 1590 1591* Crafted addpeer with hmode > 7 causes array wraparound with MATCH_ASSOC 1592 Date Resolved: Stable (4.2.8p7) 26 Apr 2016; Dev (4.3.92) 26 Apr 2016 1593 References: Sec 3009 / CVE-2016-2518 / VU#718152 1594 Affects: All ntp-4 releases up to, but not including 4.2.8p7, and 1595 4.3.0 up to, but not including 4.3.92 1596 CVSS2: LOW 2.1 - (AV:N/AC:H/Au:S/C:N/I:N/A:P) 1597 CVSS3: LOW 2.0 - CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:L 1598 Summary: Using a crafted packet to create a peer association with 1599 hmode > 7 causes the MATCH_ASSOC() lookup to make an 1600 out-of-bounds reference. 1601 Mitigation: 1602 Implement BCP-38. 1603 Upgrade to 4.2.8p7, or later, from the NTP Project Download Page 1604 or the NTP Public Services Project Download Page 1605 Properly monitor your ntpd instances 1606 Credit: This weakness was discovered by Yihan Lian of the Cloud 1607 Security Team, Qihoo 360. 1608 1609* remote configuration trustedkey/requestkey/controlkey values are not 1610 properly validated 1611 Date Resolved: Stable (4.2.8p7) 26 Apr 2016; Dev (4.3.92) 26 Apr 2016 1612 References: Sec 3010 / CVE-2016-2517 / VU#718152 1613 Affects: All ntp-4 releases up to, but not including 4.2.8p7, and 1614 4.3.0 up to, but not including 4.3.92 1615 CVSS2: MED 4.9 - (AV:N/AC:H/Au:S/C:N/I:N/A:C) 1616 CVSS3: MED 4.2 - CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H 1617 Summary: If ntpd was expressly configured to allow for remote 1618 configuration, a malicious user who knows the controlkey for 1619 ntpq or the requestkey for ntpdc (if mode7 is expressly enabled) 1620 can create a session with ntpd and then send a crafted packet to 1621 ntpd that will change the value of the trustedkey, controlkey, 1622 or requestkey to a value that will prevent any subsequent 1623 authentication with ntpd until ntpd is restarted. 1624 Mitigation: 1625 Implement BCP-38. 1626 Upgrade to 4.2.8p7, or later, from the NTP Project Download Page 1627 or the NTP Public Services Project Download Page 1628 Properly monitor your ntpd instances 1629 Credit: This weakness was discovered by Yihan Lian of the Cloud 1630 Security Team, Qihoo 360. 1631 1632* Duplicate IPs on unconfig directives will cause an assertion botch in ntpd 1633 Date Resolved: Stable (4.2.8p7) 26 Apr 2016; Dev (4.3.92) 26 Apr 2016 1634 References: Sec 3011 / CVE-2016-2516 / VU#718152 1635 Affects: All ntp-4 releases up to, but not including 4.2.8p7, and 1636 4.3.0 up to, but not including 4.3.92 1637 CVSS2: MED 6.3 - (AV:N/AC:M/Au:S/C:N/I:N/A:C) 1638 CVSS3: MED 4.2 - CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H 1639 Summary: If ntpd was expressly configured to allow for remote 1640 configuration, a malicious user who knows the controlkey for 1641 ntpq or the requestkey for ntpdc (if mode7 is expressly enabled) 1642 can create a session with ntpd and if an existing association is 1643 unconfigured using the same IP twice on the unconfig directive 1644 line, ntpd will abort. 1645 Mitigation: 1646 Implement BCP-38. 1647 Upgrade to 4.2.8p7, or later, from the NTP Project Download Page 1648 or the NTP Public Services Project Download Page 1649 Properly monitor your ntpd instances 1650 Credit: This weakness was discovered by Yihan Lian of the Cloud 1651 Security Team, Qihoo 360. 1652 1653* Refclock impersonation vulnerability 1654 Date Resolved: Stable (4.2.8p7) 26 Apr 2016; Dev (4.3.92) 26 Apr 2016 1655 References: Sec 3020 / CVE-2016-1551 1656 Affects: On a very limited number of OSes, all NTP releases up to but 1657 not including 4.2.8p7, and 4.3.0 up to but not including 4.3.92. 1658 By "very limited number of OSes" we mean no general-purpose OSes 1659 have yet been identified that have this vulnerability. 1660 CVSSv2: LOW 2.6 - (AV:N/AC:H/Au:N/C:N/I:P/A:N) 1661 CVSSv3: LOW 3.7 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N 1662 Summary: While most OSes implement martian packet filtering in their 1663 network stack, at least regarding 127.0.0.0/8, some will allow 1664 packets claiming to be from 127.0.0.0/8 that arrive over a 1665 physical network. On these OSes, if ntpd is configured to use a 1666 reference clock an attacker can inject packets over the network 1667 that look like they are coming from that reference clock. 1668 Mitigation: 1669 Implement martian packet filtering and BCP-38. 1670 Configure ntpd to use an adequate number of time sources. 1671 Upgrade to 4.2.8p7, or later, from the NTP Project Download Page 1672 or the NTP Public Services Project Download Page 1673 If you are unable to upgrade and if you are running an OS that 1674 has this vulnerability, implement martian packet filters and 1675 lobby your OS vendor to fix this problem, or run your 1676 refclocks on computers that use OSes that are not vulnerable 1677 to these attacks and have your vulnerable machines get their 1678 time from protected resources. 1679 Properly monitor your ntpd instances. 1680 Credit: This weakness was discovered by Matt Street and others of 1681 Cisco ASIG. 1682 1683The following issues were fixed in earlier releases and contain 1684improvements in 4.2.8p7: 1685 1686* Clients that receive a KoD should validate the origin timestamp field. 1687 References: Sec 2901 / CVE-2015-7704, CVE-2015-7705 1688 Affects: All ntp-4 releases up to, but not including 4.2.8p7, 1689 Summary: Improvements to the fixes incorporated into 4.2.8p4 and 4.3.77. 1690 1691* Skeleton key: passive server with trusted key can serve time. 1692 References: Sec 2936 / CVE-2015-7974 1693 Affects: All ntp-4 releases up to, but not including 4.2.8p7, 1694 Summary: Improvements to the fixes incorporated in t 4.2.8p6 and 4.3.90. 1695 1696Two other vulnerabilities have been reported, and the mitigations 1697for these are as follows: 1698 1699* Interleave-pivot 1700 Date Resolved: Stable (4.2.8p7) 26 Apr 2016; Dev (4.3.92) 26 Apr 2016 1701 References: Sec 2978 / CVE-2016-1548 1702 Affects: All ntp-4 releases. 1703 CVSSv2: MED 6.4 - (AV:N/AC:L/Au:N/C:N/I:P/A:P) 1704 CVSSv3: MED 7.2 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L 1705 Summary: It is possible to change the time of an ntpd client or deny 1706 service to an ntpd client by forcing it to change from basic 1707 client/server mode to interleaved symmetric mode. An attacker 1708 can spoof a packet from a legitimate ntpd server with an origin 1709 timestamp that matches the peer->dst timestamp recorded for that 1710 server. After making this switch, the client will reject all 1711 future legitimate server responses. It is possible to force the 1712 victim client to move time after the mode has been changed. 1713 ntpq gives no indication that the mode has been switched. 1714 Mitigation: 1715 Implement BCP-38. 1716 Upgrade to 4.2.8p7, or later, from the NTP Project Download Page 1717 or the NTP Public Services Project Download Page. These 1718 versions will not dynamically "flip" into interleave mode 1719 unless configured to do so. 1720 Properly monitor your ntpd instances. 1721 Credit: This weakness was discovered by Miroslav Lichvar of RedHat 1722 and separately by Jonathan Gardner of Cisco ASIG. 1723 1724* Sybil vulnerability: ephemeral association attack 1725 Date Resolved: Stable (4.2.8p7) 26 Apr 2016; Dev (4.3.92) 26 Apr 2016 1726 References: Sec 3012 / CVE-2016-1549 1727 Affects: All ntp-4 releases up to, but not including 4.2.8p7, and 1728 4.3.0 up to, but not including 4.3.92 1729 CVSSv2: LOW 3.5 - (AV:N/AC:M/Au:S/C:N/I:P/A:N) 1730 CVSS3v: MED 5.3 - CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N 1731 Summary: ntpd can be vulnerable to Sybil attacks. If one is not using 1732 the feature introduced in ntp-4.2.8p6 allowing an optional 4th 1733 field in the ntp.keys file to specify which IPs can serve time, 1734 a malicious authenticated peer can create arbitrarily-many 1735 ephemeral associations in order to win the clock selection of 1736 ntpd and modify a victim's clock. 1737 Mitigation: 1738 Implement BCP-38. 1739 Use the 4th field in the ntp.keys file to specify which IPs 1740 can be time servers. 1741 Properly monitor your ntpd instances. 1742 Credit: This weakness was discovered by Matthew Van Gundy of Cisco ASIG. 1743 1744Other fixes: 1745 1746* [Bug 2831] Segmentation Fault in DNS lookup during startup. perlinger@ntp.org 1747 - fixed yet another race condition in the threaded resolver code. 1748* [Bug 2858] bool support. Use stdbool.h when available. HStenn. 1749* [Bug 2879] Improve NTP security against timing attacks. perlinger@ntp.org 1750 - integrated patches by Loganaden Velvidron <logan@ntp.org> 1751 with some modifications & unit tests 1752* [Bug 2960] async name resolution fixes for chroot() environments. 1753 Reinhard Max. 1754* [Bug 2994] Systems with HAVE_SIGNALED_IO fail to compile. perlinger@ntp.org 1755* [Bug 2995] Fixes to compile on Windows 1756* [Bug 2999] out-of-bounds access in 'is_safe_filename()'. perlinger@ntp.org 1757* [Bug 3013] Fix for ssl_init.c SHA1 test. perlinger@ntp.org 1758 - Patch provided by Ch. Weisgerber 1759* [Bug 3015] ntpq: config-from-file: "request contains an unprintable character" 1760 - A change related to [Bug 2853] forbids trailing white space in 1761 remote config commands. perlinger@ntp.org 1762* [Bug 3019] NTPD stops processing packets after ERROR_HOST_UNREACHABLE 1763 - report and patch from Aleksandr Kostikov. 1764 - Overhaul of Windows IO completion port handling. perlinger@ntp.org 1765* [Bug 3022] authkeys.c should be refactored. perlinger@ntp.org 1766 - fixed memory leak in access list (auth[read]keys.c) 1767 - refactored handling of key access lists (auth[read]keys.c) 1768 - reduced number of error branches (authreadkeys.c) 1769* [Bug 3023] ntpdate cannot correct dates in the future. perlinger@ntp.org 1770* [Bug 3030] ntpq needs a general way to specify refid output format. HStenn. 1771* [Bug 3031] ntp broadcastclient unable to synchronize to an server 1772 when the time of server changed. perlinger@ntp.org 1773 - Check the initial delay calculation and reject/unpeer the broadcast 1774 server if the delay exceeds 50ms. Retry again after the next 1775 broadcast packet. 1776* [Bug 3036] autokey trips an INSIST in authistrustedip(). Harlan Stenn. 1777* Document ntp.key's optional IP list in authenetic.html. Harlan Stenn. 1778* Update html/xleave.html documentation. Harlan Stenn. 1779* Update ntp.conf documentation. Harlan Stenn. 1780* Fix some Credit: attributions in the NEWS file. Harlan Stenn. 1781* Fix typo in html/monopt.html. Harlan Stenn. 1782* Add README.pullrequests. Harlan Stenn. 1783* Cleanup to include/ntp.h. Harlan Stenn. 1784 1785New option to 'configure': 1786 1787While looking in to the issues around Bug 2978, the "interleave pivot" 1788issue, it became clear that there are some intricate and unresolved 1789issues with interleave operations. We also realized that the interleave 1790protocol was never added to the NTPv4 Standard, and it should have been. 1791 1792Interleave mode was first released in July of 2008, and can be engaged 1793in two ways. Any 'peer' and 'broadcast' lines in the ntp.conf file may 1794contain the 'xleave' option, which will expressly enable interlave mode 1795for that association. Additionally, if a time packet arrives and is 1796found inconsistent with normal protocol behavior but has certain 1797characteristics that are compatible with interleave mode, NTP will 1798dynamically switch to interleave mode. With sufficient knowledge, an 1799attacker can send a crafted forged packet to an NTP instance that 1800triggers only one side to enter interleaved mode. 1801 1802To prevent this attack until we can thoroughly document, describe, 1803fix, and test the dynamic interleave mode, we've added a new 1804'configure' option to the build process: 1805 1806 --enable-dynamic-interleave 1807 1808This option controls whether or not NTP will, if conditions are right, 1809engage dynamic interleave mode. Dynamic interleave mode is disabled by 1810default in ntp-4.2.8p7. 1811 1812--- 1813NTP 4.2.8p6 (Harlan Stenn <stenn@ntp.org>, 2016/01/20) 1814 1815Focus: Security, Bug fixes, enhancements. 1816 1817Severity: MEDIUM 1818 1819In addition to bug fixes and enhancements, this release fixes the 1820following 1 low- and 8 medium-severity vulnerabilities: 1821 1822* Potential Infinite Loop in 'ntpq' 1823 Date Resolved: Stable (4.2.8p6) 19 Jan 2016; Dev (4.3.90) 19 Jan 2016 1824 References: Sec 2548 / CVE-2015-8158 1825 Affects: All ntp-4 releases up to, but not including 4.2.8p6, and 1826 4.3.0 up to, but not including 4.3.90 1827 CVSS2: (AV:N/AC:M/Au:N/C:N/I:N/A:P) Base Score: 4.3 - MEDIUM 1828 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Base Score: 5.3 - MEDIUM 1829 Summary: 'ntpq' processes incoming packets in a loop in 'getresponse()'. 1830 The loop's only stopping conditions are receiving a complete and 1831 correct response or hitting a small number of error conditions. 1832 If the packet contains incorrect values that don't trigger one of 1833 the error conditions, the loop continues to receive new packets. 1834 Note well, this is an attack against an instance of 'ntpq', not 1835 'ntpd', and this attack requires the attacker to do one of the 1836 following: 1837 * Own a malicious NTP server that the client trusts 1838 * Prevent a legitimate NTP server from sending packets to 1839 the 'ntpq' client 1840 * MITM the 'ntpq' communications between the 'ntpq' client 1841 and the NTP server 1842 Mitigation: 1843 Upgrade to 4.2.8p6, or later, from the NTP Project Download Page 1844 or the NTP Public Services Project Download Page 1845 Credit: This weakness was discovered by Jonathan Gardner of Cisco ASIG. 1846 1847* 0rigin: Zero Origin Timestamp Bypass 1848 Date Resolved: Stable (4.2.8p6) 19 Jan 2016; Dev (4.3.90) 19 Jan 2016 1849 References: Sec 2945 / CVE-2015-8138 1850 Affects: All ntp-4 releases up to, but not including 4.2.8p6, and 1851 4.3.0 up to, but not including 4.3.90 1852 CVSS2: (AV:N/AC:L/Au:N/C:N/I:P/A:N) Base Score: 5.0 - MEDIUM 1853 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Base Score: 5.3 - MEDIUM 1854 (3.7 - LOW if you score AC:L) 1855 Summary: To distinguish legitimate peer responses from forgeries, a 1856 client attempts to verify a response packet by ensuring that the 1857 origin timestamp in the packet matches the origin timestamp it 1858 transmitted in its last request. A logic error exists that 1859 allows packets with an origin timestamp of zero to bypass this 1860 check whenever there is not an outstanding request to the server. 1861 Mitigation: 1862 Configure 'ntpd' to get time from multiple sources. 1863 Upgrade to 4.2.8p6, or later, from the NTP Project Download Page 1864 or the NTP Public Services Project Download Page. 1865 Monitor your 'ntpd' instances. 1866 Credit: This weakness was discovered by Matthey Van Gundy and 1867 Jonathan Gardner of Cisco ASIG. 1868 1869* Stack exhaustion in recursive traversal of restriction list 1870 Date Resolved: Stable (4.2.8p6) 19 Jan 2016 1871 References: Sec 2940 / CVE-2015-7978 1872 Affects: All ntp-4 releases up to, but not including 4.2.8p6, and 1873 4.3.0 up to, but not including 4.3.90 1874 CVSS: (AV:N/AC:M/Au:N/C:N/I:N/A:P) Base Score: 4.3 - MEDIUM 1875 Summary: An unauthenticated 'ntpdc reslist' command can cause a 1876 segmentation fault in ntpd by exhausting the call stack. 1877 Mitigation: 1878 Implement BCP-38. 1879 Upgrade to 4.2.8p6, or later, from the NTP Project Download Page 1880 or the NTP Public Services Project Download Page. 1881 If you are unable to upgrade: 1882 In ntp-4.2.8, mode 7 is disabled by default. Don't enable it. 1883 If you must enable mode 7: 1884 configure the use of a 'requestkey' to control who can 1885 issue mode 7 requests. 1886 configure 'restrict noquery' to further limit mode 7 1887 requests to trusted sources. 1888 Monitor your ntpd instances. 1889 Credit: This weakness was discovered by Stephen Gray at Cisco ASIG. 1890 1891* Off-path Denial of Service (!DoS) attack on authenticated broadcast mode 1892 Date Resolved: Stable (4.2.8p6) 19 Jan 2016; Dev (4.3.90) 19 Jan 2016 1893 References: Sec 2942 / CVE-2015-7979 1894 Affects: All ntp-4 releases up to, but not including 4.2.8p6, and 1895 4.3.0 up to, but not including 4.3.90 1896 CVSS: (AV:N/AC:M/Au:N/C:N/I:P/A:P) Base Score: 5.8 1897 Summary: An off-path attacker can send broadcast packets with bad 1898 authentication (wrong key, mismatched key, incorrect MAC, etc) 1899 to broadcast clients. It is observed that the broadcast client 1900 tears down the association with the broadcast server upon 1901 receiving just one bad packet. 1902 Mitigation: 1903 Implement BCP-38. 1904 Upgrade to 4.2.8p6, or later, from the NTP Project Download Page 1905 or the NTP Public Services Project Download Page. 1906 Monitor your 'ntpd' instances. 1907 If this sort of attack is an active problem for you, you have 1908 deeper problems to investigate. In this case also consider 1909 having smaller NTP broadcast domains. 1910 Credit: This weakness was discovered by Aanchal Malhotra of Boston 1911 University. 1912 1913* reslist NULL pointer dereference 1914 Date Resolved: Stable (4.2.8p6) 19 Jan 2016; Dev (4.3.90) 19 Jan 2016 1915 References: Sec 2939 / CVE-2015-7977 1916 Affects: All ntp-4 releases up to, but not including 4.2.8p6, and 1917 4.3.0 up to, but not including 4.3.90 1918 CVSS: (AV:N/AC:M/Au:N/C:N/I:N/A:P) Base Score: 4.3 - MEDIUM 1919 Summary: An unauthenticated 'ntpdc reslist' command can cause a 1920 segmentation fault in ntpd by causing a NULL pointer dereference. 1921 Mitigation: 1922 Implement BCP-38. 1923 Upgrade to 4.2.8p6, or later, from NTP Project Download Page or 1924 the NTP Public Services Project Download Page. 1925 If you are unable to upgrade: 1926 mode 7 is disabled by default. Don't enable it. 1927 If you must enable mode 7: 1928 configure the use of a 'requestkey' to control who can 1929 issue mode 7 requests. 1930 configure 'restrict noquery' to further limit mode 7 1931 requests to trusted sources. 1932 Monitor your ntpd instances. 1933 Credit: This weakness was discovered by Stephen Gray of Cisco ASIG. 1934 1935* 'ntpq saveconfig' command allows dangerous characters in filenames. 1936 Date Resolved: Stable (4.2.8p6) 19 Jan 2016; Dev (4.3.90) 19 Jan 2016 1937 References: Sec 2938 / CVE-2015-7976 1938 Affects: All ntp-4 releases up to, but not including 4.2.8p6, and 1939 4.3.0 up to, but not including 4.3.90 1940 CVSS: (AV:N/AC:L/Au:S/C:N/I:P/A:N) Base Score: 4.0 - MEDIUM 1941 Summary: The ntpq saveconfig command does not do adequate filtering 1942 of special characters from the supplied filename. 1943 Note well: The ability to use the saveconfig command is controlled 1944 by the 'restrict nomodify' directive, and the recommended default 1945 configuration is to disable this capability. If the ability to 1946 execute a 'saveconfig' is required, it can easily (and should) be 1947 limited and restricted to a known small number of IP addresses. 1948 Mitigation: 1949 Implement BCP-38. 1950 use 'restrict default nomodify' in your 'ntp.conf' file. 1951 Upgrade to 4.2.8p6, or later, from the NTP Project Download Page. 1952 If you are unable to upgrade: 1953 build NTP with 'configure --disable-saveconfig' if you will 1954 never need this capability, or 1955 use 'restrict default nomodify' in your 'ntp.conf' file. Be 1956 careful about what IPs have the ability to send 'modify' 1957 requests to 'ntpd'. 1958 Monitor your ntpd instances. 1959 'saveconfig' requests are logged to syslog - monitor your syslog files. 1960 Credit: This weakness was discovered by Jonathan Gardner of Cisco ASIG. 1961 1962* nextvar() missing length check in ntpq 1963 Date Resolved: Stable (4.2.8p6) 19 Jan 2016; Dev (4.3.90) 19 Jan 2016 1964 References: Sec 2937 / CVE-2015-7975 1965 Affects: All ntp-4 releases up to, but not including 4.2.8p6, and 1966 4.3.0 up to, but not including 4.3.90 1967 CVSS: (AV:L/AC:H/Au:N/C:N/I:N/A:P) Base Score: 1.2 - LOW 1968 If you score A:C, this becomes 4.0. 1969 CVSSv3: (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) Base Score 2.9, LOW 1970 Summary: ntpq may call nextvar() which executes a memcpy() into the 1971 name buffer without a proper length check against its maximum 1972 length of 256 bytes. Note well that we're taking about ntpq here. 1973 The usual worst-case effect of this vulnerability is that the 1974 specific instance of ntpq will crash and the person or process 1975 that did this will have stopped themselves. 1976 Mitigation: 1977 Upgrade to 4.2.8p6, or later, from the NTP Project Download Page 1978 or the NTP Public Services Project Download Page. 1979 If you are unable to upgrade: 1980 If you have scripts that feed input to ntpq make sure there are 1981 some sanity checks on the input received from the "outside". 1982 This is potentially more dangerous if ntpq is run as root. 1983 Credit: This weakness was discovered by Jonathan Gardner at Cisco ASIG. 1984 1985* Skeleton Key: Any trusted key system can serve time 1986 Date Resolved: Stable (4.2.8p6) 19 Jan 2016; Dev (4.3.90) 19 Jan 2016 1987 References: Sec 2936 / CVE-2015-7974 1988 Affects: All ntp-4 releases up to, but not including 4.2.8p6, and 1989 4.3.0 up to, but not including 4.3.90 1990 CVSS: (AV:N/AC:H/Au:S/C:N/I:C/A:N) Base Score: 4.9 1991 Summary: Symmetric key encryption uses a shared trusted key. The 1992 reported title for this issue was "Missing key check allows 1993 impersonation between authenticated peers" and the report claimed 1994 "A key specified only for one server should only work to 1995 authenticate that server, other trusted keys should be refused." 1996 Except there has never been any correlation between this trusted 1997 key and server v. clients machines and there has never been any 1998 way to specify a key only for one server. We have treated this as 1999 an enhancement request, and ntp-4.2.8p6 includes other checks and 2000 tests to strengthen clients against attacks coming from broadcast 2001 servers. 2002 Mitigation: 2003 Implement BCP-38. 2004 If this scenario represents a real or a potential issue for you, 2005 upgrade to 4.2.8p6, or later, from the NTP Project Download 2006 Page or the NTP Public Services Project Download Page, and 2007 use the new field in the ntp.keys file that specifies the list 2008 of IPs that are allowed to serve time. Note that this alone 2009 will not protect against time packets with forged source IP 2010 addresses, however other changes in ntp-4.2.8p6 provide 2011 significant mitigation against broadcast attacks. MITM attacks 2012 are a different story. 2013 If you are unable to upgrade: 2014 Don't use broadcast mode if you cannot monitor your client 2015 servers. 2016 If you choose to use symmetric keys to authenticate time 2017 packets in a hostile environment where ephemeral time 2018 servers can be created, or if it is expected that malicious 2019 time servers will participate in an NTP broadcast domain, 2020 limit the number of participating systems that participate 2021 in the shared-key group. 2022 Monitor your ntpd instances. 2023 Credit: This weakness was discovered by Matt Street of Cisco ASIG. 2024 2025* Deja Vu: Replay attack on authenticated broadcast mode 2026 Date Resolved: Stable (4.2.8p6) 19 Jan 2016; Dev (4.3.90) 19 Jan 2016 2027 References: Sec 2935 / CVE-2015-7973 2028 Affects: All ntp-4 releases up to, but not including 4.2.8p6, and 2029 4.3.0 up to, but not including 4.3.90 2030 CVSS: (AV:A/AC:M/Au:N/C:N/I:P/A:P) Base Score: 4.3 - MEDIUM 2031 Summary: If an NTP network is configured for broadcast operations then 2032 either a man-in-the-middle attacker or a malicious participant 2033 that has the same trusted keys as the victim can replay time packets. 2034 Mitigation: 2035 Implement BCP-38. 2036 Upgrade to 4.2.8p6, or later, from the NTP Project Download Page 2037 or the NTP Public Services Project Download Page. 2038 If you are unable to upgrade: 2039 Don't use broadcast mode if you cannot monitor your client servers. 2040 Monitor your ntpd instances. 2041 Credit: This weakness was discovered by Aanchal Malhotra of Boston 2042 University. 2043 2044Other fixes: 2045 2046* [Bug 2772] adj_systime overflows tv_usec. perlinger@ntp.org 2047* [Bug 2814] msyslog deadlock when signaled. perlinger@ntp.org 2048 - applied patch by shenpeng11@huawei.com with minor adjustments 2049* [Bug 2882] Look at ntp_request.c:list_peers_sum(). perlinger@ntp.org 2050* [Bug 2891] Deadlock in deferred DNS lookup framework. perlinger@ntp.org 2051* [Bug 2892] Several test cases assume IPv6 capabilities even when 2052 IPv6 is disabled in the build. perlinger@ntp.org 2053 - Found this already fixed, but validation led to cleanup actions. 2054* [Bug 2905] DNS lookups broken. perlinger@ntp.org 2055 - added limits to stack consumption, fixed some return code handling 2056* [Bug 2971] ntpq bails on ^C: select fails: Interrupted system call 2057 - changed stacked/nested handling of CTRL-C. perlinger@ntp.org 2058 - make CTRL-C work for retrieval and printing od MRU list. perlinger@ntp.org 2059* [Bug 2980] reduce number of warnings. perlinger@ntp.org 2060 - integrated several patches from Havard Eidnes (he@uninett.no) 2061* [Bug 2985] bogus calculation in authkeys.c perlinger@ntp.org 2062 - implement 'auth_log2()' using integer bithack instead of float calculation 2063* Make leapsec_query debug messages less verbose. Harlan Stenn. 2064 2065--- 2066NTP 4.2.8p5 (Harlan Stenn <stenn@ntp.org>, 2016/01/07) 2067 2068Focus: Security, Bug fixes, enhancements. 2069 2070Severity: MEDIUM 2071 2072In addition to bug fixes and enhancements, this release fixes the 2073following medium-severity vulnerability: 2074 2075* Small-step/big-step. Close the panic gate earlier. 2076 References: Sec 2956, CVE-2015-5300 2077 Affects: All ntp-4 releases up to, but not including 4.2.8p5, and 2078 4.3.0 up to, but not including 4.3.78 2079 CVSS3: (AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:L) Base Score: 4.0, MEDIUM 2080 Summary: If ntpd is always started with the -g option, which is 2081 common and against long-standing recommendation, and if at the 2082 moment ntpd is restarted an attacker can immediately respond to 2083 enough requests from enough sources trusted by the target, which 2084 is difficult and not common, there is a window of opportunity 2085 where the attacker can cause ntpd to set the time to an 2086 arbitrary value. Similarly, if an attacker is able to respond 2087 to enough requests from enough sources trusted by the target, 2088 the attacker can cause ntpd to abort and restart, at which 2089 point it can tell the target to set the time to an arbitrary 2090 value if and only if ntpd was re-started against long-standing 2091 recommendation with the -g flag, or if ntpd was not given the 2092 -g flag, the attacker can move the target system's time by at 2093 most 900 seconds' time per attack. 2094 Mitigation: 2095 Configure ntpd to get time from multiple sources. 2096 Upgrade to 4.2.8p5, or later, from the NTP Project Download 2097 Page or the NTP Public Services Project Download Page 2098 As we've long documented, only use the -g option to ntpd in 2099 cold-start situations. 2100 Monitor your ntpd instances. 2101 Credit: This weakness was discovered by Aanchal Malhotra, 2102 Isaac E. Cohen, and Sharon Goldberg at Boston University. 2103 2104 NOTE WELL: The -g flag disables the limit check on the panic_gate 2105 in ntpd, which is 900 seconds by default. The bug identified by 2106 the researchers at Boston University is that the panic_gate 2107 check was only re-enabled after the first change to the system 2108 clock that was greater than 128 milliseconds, by default. The 2109 correct behavior is that the panic_gate check should be 2110 re-enabled after any initial time correction. 2111 2112 If an attacker is able to inject consistent but erroneous time 2113 responses to your systems via the network or "over the air", 2114 perhaps by spoofing radio, cellphone, or navigation satellite 2115 transmissions, they are in a great position to affect your 2116 system's clock. There comes a point where your very best 2117 defenses include: 2118 2119 Configure ntpd to get time from multiple sources. 2120 Monitor your ntpd instances. 2121 2122Other fixes: 2123 2124* Coverity submission process updated from Coverity 5 to Coverity 7. 2125 The NTP codebase has been undergoing regular Coverity scans on an 2126 ongoing basis since 2006. As part of our recent upgrade from 2127 Coverity 5 to Coverity 7, Coverity identified 16 nits in some of 2128 the newly-written Unity test programs. These were fixed. 2129* [Bug 2829] Clean up pipe_fds in ntpd.c perlinger@ntp.org 2130* [Bug 2887] stratum -1 config results as showing value 99 2131 - fudge stratum should only accept values [0..16]. perlinger@ntp.org 2132* [Bug 2932] Update leapsecond file info in miscopt.html. CWoodbury, HStenn. 2133* [Bug 2934] tests/ntpd/t-ntp_scanner.c has a magic constant wired in. HMurray 2134* [Bug 2944] errno is not preserved properly in ntpdate after sendto call. 2135 - applied patch by Christos Zoulas. perlinger@ntp.org 2136* [Bug 2952] Peer associations broken by fix for Bug 2901/CVE-2015-7704. 2137* [Bug 2954] Version 4.2.8p4 crashes on startup on some OSes. 2138 - fixed data race conditions in threaded DNS worker. perlinger@ntp.org 2139 - limit threading warm-up to linux; FreeBSD bombs on it. perlinger@ntp.org 2140* [Bug 2957] 'unsigned int' vs 'size_t' format clash. perlinger@ntp.org 2141 - accept key file only if there are no parsing errors 2142 - fixed size_t/u_int format clash 2143 - fixed wrong use of 'strlcpy' 2144* [Bug 2958] ntpq: fatal error messages need a final newline. Craig Leres. 2145* [Bug 2962] truncation of size_t/ptrdiff_t on 64bit targets. perlinger@ntp.org 2146 - fixed several other warnings (cast-alignment, missing const, missing prototypes) 2147 - promote use of 'size_t' for values that express a size 2148 - use ptr-to-const for read-only arguments 2149 - make sure SOCKET values are not truncated (win32-specific) 2150 - format string fixes 2151* [Bug 2965] Local clock didn't work since 4.2.8p4. Martin Burnicki. 2152* [Bug 2967] ntpdate command suffers an assertion failure 2153 - fixed ntp_rfc2553.c to return proper address length. perlinger@ntp.org 2154* [Bug 2969] Seg fault from ntpq/mrulist when looking at server with 2155 lots of clients. perlinger@ntp.org 2156* [Bug 2971] ntpq bails on ^C: select fails: Interrupted system call 2157 - changed stacked/nested handling of CTRL-C. perlinger@ntp.org 2158* Unity cleanup for FreeBSD-6.4. Harlan Stenn. 2159* Unity test cleanup. Harlan Stenn. 2160* Libevent autoconf pthread fixes for FreeBSD-10. Harlan Stenn. 2161* Header cleanup in tests/sandbox/uglydate.c. Harlan Stenn. 2162* Header cleanup in tests/libntp/sfptostr.c. Harlan Stenn. 2163* Quiet a warning from clang. Harlan Stenn. 2164 2165--- 2166NTP 4.2.8p4 (Harlan Stenn <stenn@ntp.org>, 2015/10/21) 2167 2168Focus: Security, Bug fixes, enhancements. 2169 2170Severity: MEDIUM 2171 2172In addition to bug fixes and enhancements, this release fixes the 2173following 13 low- and medium-severity vulnerabilities: 2174 2175* Incomplete vallen (value length) checks in ntp_crypto.c, leading 2176 to potential crashes or potential code injection/information leakage. 2177 2178 References: Sec 2899, Sec 2671, CVE-2015-7691, CVE-2015-7692, CVE-2015-7702 2179 Affects: All ntp-4 releases up to, but not including 4.2.8p4, 2180 and 4.3.0 up to, but not including 4.3.77 2181 CVSS: (AV:N/AC:H/Au:M/C:N/I:N/A:C) Base Score: 4.6 2182 Summary: The fix for CVE-2014-9750 was incomplete in that there were 2183 certain code paths where a packet with particular autokey operations 2184 that contained malicious data was not always being completely 2185 validated. Receipt of these packets can cause ntpd to crash. 2186 Mitigation: 2187 Don't use autokey. 2188 Upgrade to 4.2.8p4, or later, from the NTP Project Download 2189 Page or the NTP Public Services Project Download Page 2190 Monitor your ntpd instances. 2191 Credit: This weakness was discovered by Tenable Network Security. 2192 2193* Clients that receive a KoD should validate the origin timestamp field. 2194 2195 References: Sec 2901 / CVE-2015-7704, CVE-2015-7705 2196 Affects: All ntp-4 releases up to, but not including 4.2.8p4, 2197 and 4.3.0 up to, but not including 4.3.77 2198 CVSS: (AV:N/AC:M/Au:N/C:N/I:N/A:P) Base Score: 4.3-5.0 at worst 2199 Summary: An ntpd client that honors Kiss-of-Death responses will honor 2200 KoD messages that have been forged by an attacker, causing it to 2201 delay or stop querying its servers for time updates. Also, an 2202 attacker can forge packets that claim to be from the target and 2203 send them to servers often enough that a server that implements 2204 KoD rate limiting will send the target machine a KoD response to 2205 attempt to reduce the rate of incoming packets, or it may also 2206 trigger a firewall block at the server for packets from the target 2207 machine. For either of these attacks to succeed, the attacker must 2208 know what servers the target is communicating with. An attacker 2209 can be anywhere on the Internet and can frequently learn the 2210 identity of the target's time source by sending the target a 2211 time query. 2212 Mitigation: 2213 Implement BCP-38. 2214 Upgrade to 4.2.8p4, or later, from the NTP Project Download Page 2215 or the NTP Public Services Project Download Page 2216 If you can't upgrade, restrict who can query ntpd to learn who 2217 its servers are, and what IPs are allowed to ask your system 2218 for the time. This mitigation is heavy-handed. 2219 Monitor your ntpd instances. 2220 Note: 2221 4.2.8p4 protects against the first attack. For the second attack, 2222 all we can do is warn when it is happening, which we do in 4.2.8p4. 2223 Credit: This weakness was discovered by Aanchal Malhotra, 2224 Issac E. Cohen, and Sharon Goldberg of Boston University. 2225 2226* configuration directives to change "pidfile" and "driftfile" should 2227 only be allowed locally. 2228 2229 References: Sec 2902 / CVE-2015-5196 2230 Affects: All ntp-4 releases up to, but not including 4.2.8p4, 2231 and 4.3.0 up to, but not including 4.3.77 2232 CVSS: (AV:N/AC:H/Au:M/C:N/I:C/A:C) Base Score: 6.2 worst case 2233 Summary: If ntpd is configured to allow for remote configuration, 2234 and if the (possibly spoofed) source IP address is allowed to 2235 send remote configuration requests, and if the attacker knows 2236 the remote configuration password, it's possible for an attacker 2237 to use the "pidfile" or "driftfile" directives to potentially 2238 overwrite other files. 2239 Mitigation: 2240 Implement BCP-38. 2241 Upgrade to 4.2.8p4, or later, from the NTP Project Download 2242 Page or the NTP Public Services Project Download Page 2243 If you cannot upgrade, don't enable remote configuration. 2244 If you must enable remote configuration and cannot upgrade, 2245 remote configuration of NTF's ntpd requires: 2246 - an explicitly configured trustedkey, and you should also 2247 configure a controlkey. 2248 - access from a permitted IP. You choose the IPs. 2249 - authentication. Don't disable it. Practice secure key safety. 2250 Monitor your ntpd instances. 2251 Credit: This weakness was discovered by Miroslav Lichvar of Red Hat. 2252 2253* Slow memory leak in CRYPTO_ASSOC 2254 2255 References: Sec 2909 / CVE-2015-7701 2256 Affects: All ntp-4 releases that use autokey up to, but not 2257 including 4.2.8p4, and 4.3.0 up to, but not including 4.3.77 2258 CVSS: (AV:N/AC:H/Au:M/C:N/I:N/A:C) Base Score: 0.0 best/usual case, 2259 4.6 otherwise 2260 Summary: If ntpd is configured to use autokey, then an attacker can 2261 send packets to ntpd that will, after several days of ongoing 2262 attack, cause it to run out of memory. 2263 Mitigation: 2264 Don't use autokey. 2265 Upgrade to 4.2.8p4, or later, from the NTP Project Download 2266 Page or the NTP Public Services Project Download Page 2267 Monitor your ntpd instances. 2268 Credit: This weakness was discovered by Tenable Network Security. 2269 2270* mode 7 loop counter underrun 2271 2272 References: Sec 2913 / CVE-2015-7848 / TALOS-CAN-0052 2273 Affects: All ntp-4 releases up to, but not including 4.2.8p4, 2274 and 4.3.0 up to, but not including 4.3.77 2275 CVSS: (AV:N/AC:H/Au:M/C:N/I:N/A:C) Base Score: 4.6 2276 Summary: If ntpd is configured to enable mode 7 packets, and if the 2277 use of mode 7 packets is not properly protected thru the use of 2278 the available mode 7 authentication and restriction mechanisms, 2279 and if the (possibly spoofed) source IP address is allowed to 2280 send mode 7 queries, then an attacker can send a crafted packet 2281 to ntpd that will cause it to crash. 2282 Mitigation: 2283 Implement BCP-38. 2284 Upgrade to 4.2.8p4, or later, from the NTP Project Download 2285 Page or the NTP Public Services Project Download Page. 2286 If you are unable to upgrade: 2287 In ntp-4.2.8, mode 7 is disabled by default. Don't enable it. 2288 If you must enable mode 7: 2289 configure the use of a requestkey to control who can issue 2290 mode 7 requests. 2291 configure restrict noquery to further limit mode 7 requests 2292 to trusted sources. 2293 Monitor your ntpd instances. 2294Credit: This weakness was discovered by Aleksandar Nikolic of Cisco Talos. 2295 2296* memory corruption in password store 2297 2298 References: Sec 2916 / CVE-2015-7849 / TALOS-CAN-0054 2299 Affects: All ntp-4 releases up to, but not including 4.2.8p4, and 4.3.0 up to, but not including 4.3.77 2300 CVSS: (AV:N/AC:H/Au:M/C:N/I:C/A:C) Base Score: 6.8, worst case 2301 Summary: If ntpd is configured to allow remote configuration, and if 2302 the (possibly spoofed) source IP address is allowed to send 2303 remote configuration requests, and if the attacker knows the 2304 remote configuration password or if ntpd was configured to 2305 disable authentication, then an attacker can send a set of 2306 packets to ntpd that may cause a crash or theoretically 2307 perform a code injection attack. 2308 Mitigation: 2309 Implement BCP-38. 2310 Upgrade to 4.2.8p4, or later, from the NTP Project Download 2311 Page or the NTP Public Services Project Download Page. 2312 If you are unable to upgrade, remote configuration of NTF's 2313 ntpd requires: 2314 an explicitly configured "trusted" key. Only configure 2315 this if you need it. 2316 access from a permitted IP address. You choose the IPs. 2317 authentication. Don't disable it. Practice secure key safety. 2318 Monitor your ntpd instances. 2319 Credit: This weakness was discovered by Yves Younan of Cisco Talos. 2320 2321* Infinite loop if extended logging enabled and the logfile and 2322 keyfile are the same. 2323 2324 References: Sec 2917 / CVE-2015-7850 / TALOS-CAN-0055 2325 Affects: All ntp-4 releases up to, but not including 4.2.8p4, 2326 and 4.3.0 up to, but not including 4.3.77 2327 CVSS: (AV:N/AC:H/Au:M/C:N/I:N/A:C) Base Score: 4.6, worst case 2328 Summary: If ntpd is configured to allow remote configuration, and if 2329 the (possibly spoofed) source IP address is allowed to send 2330 remote configuration requests, and if the attacker knows the 2331 remote configuration password or if ntpd was configured to 2332 disable authentication, then an attacker can send a set of 2333 packets to ntpd that will cause it to crash and/or create a 2334 potentially huge log file. Specifically, the attacker could 2335 enable extended logging, point the key file at the log file, 2336 and cause what amounts to an infinite loop. 2337 Mitigation: 2338 Implement BCP-38. 2339 Upgrade to 4.2.8p4, or later, from the NTP Project Download 2340 Page or the NTP Public Services Project Download Page. 2341 If you are unable to upgrade, remote configuration of NTF's ntpd 2342 requires: 2343 an explicitly configured "trusted" key. Only configure this 2344 if you need it. 2345 access from a permitted IP address. You choose the IPs. 2346 authentication. Don't disable it. Practice secure key safety. 2347 Monitor your ntpd instances. 2348 Credit: This weakness was discovered by Yves Younan of Cisco Talos. 2349 2350* Potential path traversal vulnerability in the config file saving of 2351 ntpd on VMS. 2352 2353 References: Sec 2918 / CVE-2015-7851 / TALOS-CAN-0062 2354 Affects: All ntp-4 releases running under VMS up to, but not 2355 including 4.2.8p4, and 4.3.0 up to, but not including 4.3.77 2356 CVSS: (AV:N/AC:H/Au:M/C:N/I:P/A:C) Base Score: 5.2, worst case 2357 Summary: If ntpd is configured to allow remote configuration, and if 2358 the (possibly spoofed) IP address is allowed to send remote 2359 configuration requests, and if the attacker knows the remote 2360 configuration password or if ntpd was configured to disable 2361 authentication, then an attacker can send a set of packets to 2362 ntpd that may cause ntpd to overwrite files. 2363 Mitigation: 2364 Implement BCP-38. 2365 Upgrade to 4.2.8p4, or later, from the NTP Project Download 2366 Page or the NTP Public Services Project Download Page. 2367 If you are unable to upgrade, remote configuration of NTF's ntpd 2368 requires: 2369 an explicitly configured "trusted" key. Only configure 2370 this if you need it. 2371 access from permitted IP addresses. You choose the IPs. 2372 authentication. Don't disable it. Practice key security safety. 2373 Monitor your ntpd instances. 2374 Credit: This weakness was discovered by Yves Younan of Cisco Talos. 2375 2376* ntpq atoascii() potential memory corruption 2377 2378 References: Sec 2919 / CVE-2015-7852 / TALOS-CAN-0063 2379 Affects: All ntp-4 releases running up to, but not including 4.2.8p4, 2380 and 4.3.0 up to, but not including 4.3.77 2381 CVSS: (AV:N/AC:H/Au:N/C:N/I:P/A:P) Base Score: 4.0, worst case 2382 Summary: If an attacker can figure out the precise moment that ntpq 2383 is listening for data and the port number it is listening on or 2384 if the attacker can provide a malicious instance ntpd that 2385 victims will connect to then an attacker can send a set of 2386 crafted mode 6 response packets that, if received by ntpq, 2387 can cause ntpq to crash. 2388 Mitigation: 2389 Implement BCP-38. 2390 Upgrade to 4.2.8p4, or later, from the NTP Project Download 2391 Page or the NTP Public Services Project Download Page. 2392 If you are unable to upgrade and you run ntpq against a server 2393 and ntpq crashes, try again using raw mode. Build or get a 2394 patched ntpq and see if that fixes the problem. Report new 2395 bugs in ntpq or abusive servers appropriately. 2396 If you use ntpq in scripts, make sure ntpq does what you expect 2397 in your scripts. 2398 Credit: This weakness was discovered by Yves Younan and 2399 Aleksander Nikolich of Cisco Talos. 2400 2401* Invalid length data provided by a custom refclock driver could cause 2402 a buffer overflow. 2403 2404 References: Sec 2920 / CVE-2015-7853 / TALOS-CAN-0064 2405 Affects: Potentially all ntp-4 releases running up to, but not 2406 including 4.2.8p4, and 4.3.0 up to, but not including 4.3.77 2407 that have custom refclocks 2408 CVSS: (AV:L/AC:H/Au:M/C:C/I:C/A:C) Base Score: 0.0 usual case, 2409 5.9 unusual worst case 2410 Summary: A negative value for the datalen parameter will overflow a 2411 data buffer. NTF's ntpd driver implementations always set this 2412 value to 0 and are therefore not vulnerable to this weakness. 2413 If you are running a custom refclock driver in ntpd and that 2414 driver supplies a negative value for datalen (no custom driver 2415 of even minimal competence would do this) then ntpd would 2416 overflow a data buffer. It is even hypothetically possible 2417 in this case that instead of simply crashing ntpd the attacker 2418 could effect a code injection attack. 2419 Mitigation: 2420 Upgrade to 4.2.8p4, or later, from the NTP Project Download 2421 Page or the NTP Public Services Project Download Page. 2422 If you are unable to upgrade: 2423 If you are running custom refclock drivers, make sure 2424 the signed datalen value is either zero or positive. 2425 Monitor your ntpd instances. 2426 Credit: This weakness was discovered by Yves Younan of Cisco Talos. 2427 2428* Password Length Memory Corruption Vulnerability 2429 2430 References: Sec 2921 / CVE-2015-7854 / TALOS-CAN-0065 2431 Affects: All ntp-4 releases up to, but not including 4.2.8p4, and 2432 4.3.0 up to, but not including 4.3.77 2433 CVSS: (AV:N/AC:H/Au:M/C:C/I:C/A:C) Base Score: 0.0 best case, 2434 1.7 usual case, 6.8, worst case 2435 Summary: If ntpd is configured to allow remote configuration, and if 2436 the (possibly spoofed) source IP address is allowed to send 2437 remote configuration requests, and if the attacker knows the 2438 remote configuration password or if ntpd was (foolishly) 2439 configured to disable authentication, then an attacker can 2440 send a set of packets to ntpd that may cause it to crash, 2441 with the hypothetical possibility of a small code injection. 2442 Mitigation: 2443 Implement BCP-38. 2444 Upgrade to 4.2.8p4, or later, from the NTP Project Download 2445 Page or the NTP Public Services Project Download Page. 2446 If you are unable to upgrade, remote configuration of NTF's 2447 ntpd requires: 2448 an explicitly configured "trusted" key. Only configure 2449 this if you need it. 2450 access from a permitted IP address. You choose the IPs. 2451 authentication. Don't disable it. Practice secure key safety. 2452 Monitor your ntpd instances. 2453 Credit: This weakness was discovered by Yves Younan and 2454 Aleksander Nikolich of Cisco Talos. 2455 2456* decodenetnum() will ASSERT botch instead of returning FAIL on some 2457 bogus values. 2458 2459 References: Sec 2922 / CVE-2015-7855 2460 Affects: All ntp-4 releases up to, but not including 4.2.8p4, and 2461 4.3.0 up to, but not including 4.3.77 2462 CVSS: (AV:N/AC:H/Au:M/C:N/I:N/A:C) Base Score: 4.6, worst case 2463 Summary: If ntpd is fed a crafted mode 6 or mode 7 packet containing 2464 an unusually long data value where a network address is expected, 2465 the decodenetnum() function will abort with an assertion failure 2466 instead of simply returning a failure condition. 2467 Mitigation: 2468 Implement BCP-38. 2469 Upgrade to 4.2.8p4, or later, from the NTP Project Download 2470 Page or the NTP Public Services Project Download Page. 2471 If you are unable to upgrade: 2472 mode 7 is disabled by default. Don't enable it. 2473 Use restrict noquery to limit who can send mode 6 2474 and mode 7 requests. 2475 Configure and use the controlkey and requestkey 2476 authentication directives to limit who can 2477 send mode 6 and mode 7 requests. 2478 Monitor your ntpd instances. 2479 Credit: This weakness was discovered by John D "Doug" Birdwell of IDA.org. 2480 2481* NAK to the Future: Symmetric association authentication bypass via 2482 crypto-NAK. 2483 2484 References: Sec 2941 / CVE-2015-7871 2485 Affects: All ntp-4 releases between 4.2.5p186 up to but not including 2486 4.2.8p4, and 4.3.0 up to but not including 4.3.77 2487 CVSS: (AV:N/AC:L/Au:N/C:N/I:P/A:P) Base Score: 6.4 2488 Summary: Crypto-NAK packets can be used to cause ntpd to accept time 2489 from unauthenticated ephemeral symmetric peers by bypassing the 2490 authentication required to mobilize peer associations. This 2491 vulnerability appears to have been introduced in ntp-4.2.5p186 2492 when the code handling mobilization of new passive symmetric 2493 associations (lines 1103-1165) was refactored. 2494 Mitigation: 2495 Implement BCP-38. 2496 Upgrade to 4.2.8p4, or later, from the NTP Project Download 2497 Page or the NTP Public Services Project Download Page. 2498 If you are unable to upgrade: 2499 Apply the patch to the bottom of the "authentic" check 2500 block around line 1136 of ntp_proto.c. 2501 Monitor your ntpd instances. 2502 Credit: This weakness was discovered by Matthew Van Gundy of Cisco ASIG. 2503 2504Backward-Incompatible changes: 2505* [Bug 2817] Default on Linux is now "rlimit memlock -1". 2506 While the general default of 32M is still the case, under Linux 2507 the default value has been changed to -1 (do not lock ntpd into 2508 memory). A value of 0 means "lock ntpd into memory with whatever 2509 memory it needs." If your ntp.conf file has an explicit "rlimit memlock" 2510 value in it, that value will continue to be used. 2511 2512* [Bug 2886] Misspelling: "outlyer" should be "outlier". 2513 If you've written a script that looks for this case in, say, the 2514 output of ntpq, you probably want to change your regex matches 2515 from 'outlyer' to 'outl[iy]er'. 2516 2517New features in this release: 2518* 'rlimit memlock' now has finer-grained control. A value of -1 means 2519 "don't lock ntpd into memore". This is the default for Linux boxes. 2520 A value of 0 means "lock ntpd into memory" with no limits. Otherwise 2521 the value is the number of megabytes of memory to lock. The default 2522 is 32 megabytes. 2523 2524* The old Google Test framework has been replaced with a new framework, 2525 based on http://www.throwtheswitch.org/unity/ . 2526 2527Bug Fixes and Improvements: 2528* [Bug 2332] (reopened) Exercise thread cancellation once before dropping 2529 privileges and limiting resources in NTPD removes the need to link 2530 forcefully against 'libgcc_s' which does not always work. J.Perlinger 2531* [Bug 2595] ntpdate man page quirks. Hal Murray, Harlan Stenn. 2532* [Bug 2625] Deprecate flag1 in local refclock. Hal Murray, Harlan Stenn. 2533* [Bug 2817] Stop locking ntpd into memory by default under Linux. H.Stenn. 2534* [Bug 2821] minor build issues: fixed refclock_gpsdjson.c. perlinger@ntp.org 2535* [Bug 2823] ntpsweep with recursive peers option doesn't work. H.Stenn. 2536* [Bug 2849] Systems with more than one default route may never 2537 synchronize. Brian Utterback. Note that this patch might need to 2538 be reverted once Bug 2043 has been fixed. 2539* [Bug 2864] 4.2.8p3 fails to compile on Windows. Juergen Perlinger 2540* [Bug 2866] segmentation fault at initgroups(). Harlan Stenn. 2541* [Bug 2867] ntpd with autokey active crashed by 'ntpq -crv'. J.Perlinger 2542* [Bug 2873] libevent should not include .deps/ in the tarball. H.Stenn 2543* [Bug 2874] Don't distribute generated sntp/tests/fileHandlingTest.h. H.Stenn 2544* [Bug 2875] sntp/Makefile.am: Get rid of DIST_SUBDIRS. libevent must 2545 be configured for the distribution targets. Harlan Stenn. 2546* [Bug 2883] ntpd crashes on exit with empty driftfile. Miroslav Lichvar. 2547* [Bug 2886] Mis-spelling: "outlyer" should be "outlier". dave@horsfall.org 2548* [Bug 2888] streamline calendar functions. perlinger@ntp.org 2549* [Bug 2889] ntp-dev-4.3.67 does not build on Windows. perlinger@ntp.org 2550* [Bug 2890] Ignore ENOBUFS on routing netlink socket. Konstantin Khlebnikov. 2551* [Bug 2906] make check needs better support for pthreads. Harlan Stenn. 2552* [Bug 2907] dist* build targets require our libevent/ to be enabled. HStenn. 2553* [Bug 2912] no munlockall() under Windows. David Taylor, Harlan Stenn. 2554* libntp/emalloc.c: Remove explicit include of stdint.h. Harlan Stenn. 2555* Put Unity CPPFLAGS items in unity_config.h. Harlan Stenn. 2556* tests/ntpd/g_leapsec.cpp typo fix. Harlan Stenn. 2557* Phase 1 deprecation of google test in sntp/tests/. Harlan Stenn. 2558* On some versions of HP-UX, inttypes.h does not include stdint.h. H.Stenn. 2559* top_srcdir can change based on ntp v. sntp. Harlan Stenn. 2560* sntp/tests/ function parameter list cleanup. Damir Tomić. 2561* tests/libntp/ function parameter list cleanup. Damir Tomić. 2562* tests/ntpd/ function parameter list cleanup. Damir Tomić. 2563* sntp/unity/unity_config.h: handle stdint.h. Harlan Stenn. 2564* sntp/unity/unity_internals.h: handle *INTPTR_MAX on old Solaris. H.Stenn. 2565* tests/libntp/timevalops.c and timespecops.c fixed error printing. D.Tomić. 2566* tests/libntp/ improvements in code and fixed error printing. Damir Tomić. 2567* tests/libntp: a_md5encrypt.c, authkeys.c, buftvtots.c, calendar.c, caljulian.c, 2568 caltontp.c, clocktime.c, humandate.c, hextolfp.c, decodenetnum.c - fixed 2569 formatting; first declaration, then code (C90); deleted unnecessary comments; 2570 changed from sprintf to snprintf; fixed order of includes. Tomasz Flendrich 2571* tests/libntp/lfpfunc.c remove unnecessary include, remove old comments, 2572 fix formatting, cleanup. Tomasz Flendrich 2573* tests/libntp/lfptostr.c remove unnecessary include, add consts, fix formatting. 2574 Tomasz Flendrich 2575* tests/libntp/statestr.c remove empty functions, remove unnecessary include, 2576 fix formatting. Tomasz Flendrich 2577* tests/libntp/modetoa.c fixed formatting. Tomasz Flendrich 2578* tests/libntp/msyslog.c fixed formatting. Tomasz Flendrich 2579* tests/libntp/numtoa.c deleted unnecessary empty functions, fixed formatting. 2580 Tomasz Flendrich 2581* tests/libntp/numtohost.c added const, fixed formatting. Tomasz Flendrich 2582* tests/libntp/refnumtoa.c fixed formatting. Tomasz Flendrich 2583* tests/libntp/ssl_init.c fixed formatting. Tomasz Flendrich 2584* tests/libntp/tvtots.c fixed a bug, fixed formatting. Tomasz Flendrich 2585* tests/libntp/uglydate.c removed an unnecessary include. Tomasz Flendrich 2586* tests/libntp/vi64ops.c removed an unnecessary comment, fixed formatting. 2587* tests/libntp/ymd3yd.c removed an empty function and an unnecessary include, 2588fixed formatting. Tomasz Flendrich 2589* tests/libntp/timespecops.c fixed formatting, fixed the order of includes, 2590 removed unnecessary comments, cleanup. Tomasz Flendrich 2591* tests/libntp/timevalops.c fixed the order of includes, deleted unnecessary 2592 comments, cleanup. Tomasz Flendrich 2593* tests/libntp/sockaddrtest.h making it agree to NTP's conventions of formatting. 2594 Tomasz Flendrich 2595* tests/libntp/lfptest.h cleanup. Tomasz Flendrich 2596* tests/libntp/test-libntp.c fix formatting. Tomasz Flendrich 2597* sntp/tests/crypto.c is now using proper Unity's assertions, fixed formatting. 2598 Tomasz Flendrich 2599* sntp/tests/kodDatabase.c added consts, deleted empty function, 2600 fixed formatting. Tomasz Flendrich 2601* sntp/tests/kodFile.c cleanup, fixed formatting. Tomasz Flendrich 2602* sntp/tests/packetHandling.c is now using proper Unity's assertions, 2603 fixed formatting, deleted unused variable. Tomasz Flendrich 2604* sntp/tests/keyFile.c is now using proper Unity's assertions, fixed formatting. 2605 Tomasz Flendrich 2606* sntp/tests/packetProcessing.c changed from sprintf to snprintf, 2607 fixed formatting. Tomasz Flendrich 2608* sntp/tests/utilities.c is now using proper Unity's assertions, changed 2609 the order of includes, fixed formatting, removed unnecessary comments. 2610 Tomasz Flendrich 2611* sntp/tests/sntptest.h fixed formatting. Tomasz Flendrich 2612* sntp/tests/fileHandlingTest.h.in fixed a possible buffer overflow problem, 2613 made one function do its job, deleted unnecessary prints, fixed formatting. 2614 Tomasz Flendrich 2615* sntp/unity/Makefile.am added a missing header. Tomasz Flendrich 2616* sntp/unity/unity_config.h: Distribute it. Harlan Stenn. 2617* sntp/libevent/evconfig-private.h: remove generated filefrom SCM. H.Stenn. 2618* sntp/unity/Makefile.am: fix some broken paths. Harlan Stenn. 2619* sntp/unity/unity.c: Clean up a printf(). Harlan Stenn. 2620* Phase 1 deprecation of google test in tests/libntp/. Harlan Stenn. 2621* Don't build sntp/libevent/sample/. Harlan Stenn. 2622* tests/libntp/test_caltontp needs -lpthread. Harlan Stenn. 2623* br-flock: --enable-local-libevent. Harlan Stenn. 2624* Wrote tests for ntpd/ntp_prio_q.c. Tomasz Flendrich 2625* scripts/lib/NTP/Util.pm: stratum output is version-dependent. Harlan Stenn. 2626* Get rid of the NTP_ prefix on our assertion macros. Harlan Stenn. 2627* Code cleanup. Harlan Stenn. 2628* libntp/icom.c: Typo fix. Harlan Stenn. 2629* util/ntptime.c: initialization nit. Harlan Stenn. 2630* ntpd/ntp_peer.c:newpeer(): added a DEBUG_REQUIRE(srcadr). Harlan Stenn. 2631* Add std_unity_tests to various Makefile.am files. Harlan Stenn. 2632* ntpd/ntp_restrict.c: added a few assertions, created tests for this file. 2633 Tomasz Flendrich 2634* Changed progname to be const in many files - now it's consistent. Tomasz 2635 Flendrich 2636* Typo fix for GCC warning suppression. Harlan Stenn. 2637* Added tests/ntpd/ntp_scanner.c test. Damir Tomić. 2638* Added declarations to all Unity tests, and did minor fixes to them. 2639 Reduced the number of warnings by half. Damir Tomić. 2640* Updated generate_test_runner.rb and updated the sntp/unity/auto directory 2641 with the latest Unity updates from Mark. Damir Tomić. 2642* Retire google test - phase I. Harlan Stenn. 2643* Unity test cleanup: move declaration of 'initializing'. Harlan Stenn. 2644* Update the NEWS file. Harlan Stenn. 2645* Autoconf cleanup. Harlan Stenn. 2646* Unit test dist cleanup. Harlan Stenn. 2647* Cleanup various test Makefile.am files. Harlan Stenn. 2648* Pthread autoconf macro cleanup. Harlan Stenn. 2649* Fix progname definition in unity runner scripts. Harlan Stenn. 2650* Clean trailing whitespace in tests/ntpd/Makefile.am. Harlan Stenn. 2651* Update the patch for bug 2817. Harlan Stenn. 2652* More updates for bug 2817. Harlan Stenn. 2653* Fix bugs in tests/ntpd/ntp_prio_q.c. Harlan Stenn. 2654* gcc on older HPUX may need +allowdups. Harlan Stenn. 2655* Adding missing MCAST protection. Harlan Stenn. 2656* Disable certain test programs on certain platforms. Harlan Stenn. 2657* Implement --enable-problem-tests (on by default). Harlan Stenn. 2658* build system tweaks. Harlan Stenn. 2659 2660--- 2661NTP 4.2.8p3 (Harlan Stenn <stenn@ntp.org>, 2015/06/29) 2662 2663Focus: 1 Security fix. Bug fixes and enhancements. Leap-second improvements. 2664 2665Severity: MEDIUM 2666 2667Security Fix: 2668 2669* [Sec 2853] Crafted remote config packet can crash some versions of 2670 ntpd. Aleksis Kauppinen, Juergen Perlinger, Harlan Stenn. 2671 2672Under specific circumstances an attacker can send a crafted packet to 2673cause a vulnerable ntpd instance to crash. This requires each of the 2674following to be true: 2675 26761) ntpd set up to allow remote configuration (not allowed by default), and 26772) knowledge of the configuration password, and 26783) access to a computer entrusted to perform remote configuration. 2679 2680This vulnerability is considered low-risk. 2681 2682New features in this release: 2683 2684Optional (disabled by default) support to have ntpd provide smeared 2685leap second time. A specially built and configured ntpd will only 2686offer smeared time in response to client packets. These response 2687packets will also contain a "refid" of 254.a.b.c, where the 24 bits 2688of a, b, and c encode the amount of smear in a 2:22 integer:fraction 2689format. See README.leapsmear and http://bugs.ntp.org/2855 for more 2690information. 2691 2692 *IF YOU CHOOSE TO CONFIGURE NTPD TO PROVIDE LEAP SMEAR TIME* 2693 *BE SURE YOU DO NOT OFFER THAT TIME ON PUBLIC TIMESERVERS.* 2694 2695We've imported the Unity test framework, and have begun converting 2696the existing google-test items to this new framework. If you want 2697to write new tests or change old ones, you'll need to have ruby 2698installed. You don't need ruby to run the test suite. 2699 2700Bug Fixes and Improvements: 2701 2702* CID 739725: Fix a rare resource leak in libevent/listener.c. 2703* CID 1295478: Quiet a pedantic potential error from the fix for Bug 2776. 2704* CID 1296235: Fix refclock_jjy.c and correcting type of the driver40-ja.html 2705* CID 1269537: Clean up a line of dead code in getShmTime(). 2706* [Bug 1060] Buffer overruns in libparse/clk_rawdcf.c. Helge Oldach. 2707* [Bug 2590] autogen-5.18.5. 2708* [Bug 2612] restrict: Warn when 'monitor' can't be disabled because 2709 of 'limited'. 2710* [Bug 2650] fix includefile processing. 2711* [Bug 2745] ntpd -x steps clock on leap second 2712 Fixed an initial-value problem that caused misbehaviour in absence of 2713 any leapsecond information. 2714 Do leap second stepping only of the step adjustment is beyond the 2715 proper jump distance limit and step correction is allowed at all. 2716* [Bug 2750] build for Win64 2717 Building for 32bit of loopback ppsapi needs def file 2718* [Bug 2776] Improve ntpq's 'help keytype'. 2719* [Bug 2778] Implement "apeers" ntpq command to include associd. 2720* [Bug 2782] Refactor refclock_shm.c, add memory barrier protection. 2721* [Bug 2792] If the IFF_RUNNING interface flag is supported then an 2722 interface is ignored as long as this flag is not set since the 2723 interface is not usable (e.g., no link). 2724* [Bug 2794] Clean up kernel clock status reports. 2725* [Bug 2800] refclock_true.c true_debug() can't open debug log because 2726 of incompatible open/fdopen parameters. 2727* [Bug 2804] install-local-data assumes GNU 'find' semantics. 2728* [Bug 2805] ntpd fails to join multicast group. 2729* [Bug 2806] refclock_jjy.c supports the Telephone JJY. 2730* [Bug 2808] GPSD_JSON driver enhancements, step 1. 2731 Fix crash during cleanup if GPS device not present and char device. 2732 Increase internal token buffer to parse all JSON data, even SKY. 2733 Defer logging of errors during driver init until the first unit is 2734 started, so the syslog is not cluttered when the driver is not used. 2735 Various improvements, see http://bugs.ntp.org/2808 for details. 2736 Changed libjsmn to a more recent version. 2737* [Bug 2810] refclock_shm.c memory barrier code needs tweaks for QNX. 2738* [Bug 2813] HP-UX needs -D__STDC_VERSION__=199901L and limits.h. 2739* [Bug 2815] net-snmp before v5.4 has circular library dependencies. 2740* [Bug 2821] Add a missing NTP_PRINTF and a missing const. 2741* [Bug 2822] New leap column in sntp broke NTP::Util.pm. 2742* [Bug 2824] Convert update-leap to perl. (also see 2769) 2743* [Bug 2825] Quiet file installation in html/ . 2744* [Bug 2830] ntpd doesn't always transfer the correct TAI offset via autokey 2745 NTPD transfers the current TAI (instead of an announcement) now. 2746 This might still needed improvement. 2747 Update autokey data ASAP when 'sys_tai' changes. 2748 Fix unit test that was broken by changes for autokey update. 2749 Avoid potential signature length issue and use DPRINTF where possible 2750 in ntp_crypto.c. 2751* [Bug 2832] refclock_jjy.c supports the TDC-300. 2752* [Bug 2834] Correct a broken html tag in html/refclock.html 2753* [Bug 2836] DFC77 patches from Frank Kardel to make decoding more 2754 robust, and require 2 consecutive timestamps to be consistent. 2755* [Bug 2837] Allow a configurable DSCP value. 2756* [Bug 2837] add test for DSCP to ntpd/complete.conf.in 2757* [Bug 2842] Glitch in ntp.conf.def documentation stanza. 2758* [Bug 2842] Bug in mdoc2man. 2759* [Bug 2843] make check fails on 4.3.36 2760 Fixed compiler warnings about numeric range overflow 2761 (The original topic was fixed in a byplay to bug#2830) 2762* [Bug 2845] Harden memory allocation in ntpd. 2763* [Bug 2852] 'make check' can't find unity.h. Hal Murray. 2764* [Bug 2854] Missing brace in libntp/strdup.c. Masanari Iida. 2765* [Bug 2855] Parser fix for conditional leap smear code. Harlan Stenn. 2766* [Bug 2855] Report leap smear in the REFID. Harlan Stenn. 2767* [Bug 2855] Implement conditional leap smear code. Martin Burnicki. 2768* [Bug 2856] ntpd should wait() on terminated child processes. Paul Green. 2769* [Bug 2857] Stratus VOS does not support SIGIO. Paul Green. 2770* [Bug 2859] Improve raw DCF77 robustness deconding. Frank Kardel. 2771* [Bug 2860] ntpq ifstats sanity check is too stringent. Frank Kardel. 2772* html/drivers/driver22.html: typo fix. Harlan Stenn. 2773* refidsmear test cleanup. Tomasz Flendrich. 2774* refidsmear function support and tests. Harlan Stenn. 2775* sntp/tests/Makefile.am: remove g_nameresolution.cpp as it tested 2776 something that was only in the 4.2.6 sntp. Harlan Stenn. 2777* Modified tests/bug-2803/Makefile.am so it builds Unity framework tests. 2778 Damir Tomić 2779* Modified tests/libtnp/Makefile.am so it builds Unity framework tests. 2780 Damir Tomić 2781* Modified sntp/tests/Makefile.am so it builds Unity framework tests. 2782 Damir Tomić 2783* tests/sandbox/smeartest.c: Harlan Stenn, Damir Tomic, Juergen Perlinger. 2784* Converted from gtest to Unity: tests/bug-2803/. Damir Tomić 2785* Converted from gtest to Unity: tests/libntp/ a_md5encrypt, atoint.c, 2786 atouint.c, authkeys.c, buftvtots.c, calendar.c, caljulian.c, 2787 calyearstart.c, clocktime.c, hextoint.c, lfpfunc.c, modetoa.c, 2788 numtoa.c, numtohost.c, refnumtoa.c, ssl_init.c, statestr.c, 2789 timespecops.c, timevalops.c, uglydate.c, vi64ops.c, ymd2yd.c. 2790 Damir Tomić 2791* Converted from gtest to Unity: sntp/tests/ kodDatabase.c, kodFile.c, 2792 networking.c, keyFile.c, utilities.cpp, sntptest.h, 2793 fileHandlingTest.h. Damir Tomić 2794* Initial support for experimental leap smear code. Harlan Stenn. 2795* Fixes to sntp/tests/fileHandlingTest.h.in. Harlan Stenn. 2796* Report select() debug messages at debug level 3 now. 2797* sntp/scripts/genLocInfo: treat raspbian as debian. 2798* Unity test framework fixes. 2799 ** Requires ruby for changes to tests. 2800* Initial support for PACKAGE_VERSION tests. 2801* sntp/libpkgver belongs in EXTRA_DIST, not DIST_SUBDIRS. 2802* tests/bug-2803/Makefile.am must distribute bug-2803.h. 2803* Add an assert to the ntpq ifstats code. 2804* Clean up the RLIMIT_STACK code. 2805* Improve the ntpq documentation around the controlkey keyid. 2806* ntpq.c cleanup. 2807* Windows port build cleanup. 2808 2809--- 2810NTP 4.2.8p2 (Harlan Stenn <stenn@ntp.org>, 2015/04/07) 2811 2812Focus: Security and Bug fixes, enhancements. 2813 2814Severity: MEDIUM 2815 2816In addition to bug fixes and enhancements, this release fixes the 2817following medium-severity vulnerabilities involving private key 2818authentication: 2819 2820* [Sec 2779] ntpd accepts unauthenticated packets with symmetric key crypto. 2821 2822 References: Sec 2779 / CVE-2015-1798 / VU#374268 2823 Affects: All NTP4 releases starting with ntp-4.2.5p99 up to but not 2824 including ntp-4.2.8p2 where the installation uses symmetric keys 2825 to authenticate remote associations. 2826 CVSS: (AV:A/AC:M/Au:N/C:P/I:P/A:P) Base Score: 5.4 2827 Date Resolved: Stable (4.2.8p2) 07 Apr 2015 2828 Summary: When ntpd is configured to use a symmetric key to authenticate 2829 a remote NTP server/peer, it checks if the NTP message 2830 authentication code (MAC) in received packets is valid, but not if 2831 there actually is any MAC included. Packets without a MAC are 2832 accepted as if they had a valid MAC. This allows a MITM attacker to 2833 send false packets that are accepted by the client/peer without 2834 having to know the symmetric key. The attacker needs to know the 2835 transmit timestamp of the client to match it in the forged reply 2836 and the false reply needs to reach the client before the genuine 2837 reply from the server. The attacker doesn't necessarily need to be 2838 relaying the packets between the client and the server. 2839 2840 Authentication using autokey doesn't have this problem as there is 2841 a check that requires the key ID to be larger than NTP_MAXKEY, 2842 which fails for packets without a MAC. 2843 Mitigation: 2844 Upgrade to 4.2.8p2, or later, from the NTP Project Download Page 2845 or the NTP Public Services Project Download Page 2846 Configure ntpd with enough time sources and monitor it properly. 2847 Credit: This issue was discovered by Miroslav Lichvar, of Red Hat. 2848 2849* [Sec 2781] Authentication doesn't protect symmetric associations against 2850 DoS attacks. 2851 2852 References: Sec 2781 / CVE-2015-1799 / VU#374268 2853 Affects: All NTP releases starting with at least xntp3.3wy up to but 2854 not including ntp-4.2.8p2 where the installation uses symmetric 2855 key authentication. 2856 CVSS: (AV:A/AC:M/Au:N/C:P/I:P/A:P) Base Score: 5.4 2857 Note: the CVSS base Score for this issue could be 4.3 or lower, and 2858 it could be higher than 5.4. 2859 Date Resolved: Stable (4.2.8p2) 07 Apr 2015 2860 Summary: An attacker knowing that NTP hosts A and B are peering with 2861 each other (symmetric association) can send a packet to host A 2862 with source address of B which will set the NTP state variables 2863 on A to the values sent by the attacker. Host A will then send 2864 on its next poll to B a packet with originate timestamp that 2865 doesn't match the transmit timestamp of B and the packet will 2866 be dropped. If the attacker does this periodically for both 2867 hosts, they won't be able to synchronize to each other. This is 2868 a known denial-of-service attack, described at 2869 https://www.eecis.udel.edu/~mills/onwire.html . 2870 2871 According to the document the NTP authentication is supposed to 2872 protect symmetric associations against this attack, but that 2873 doesn't seem to be the case. The state variables are updated even 2874 when authentication fails and the peers are sending packets with 2875 originate timestamps that don't match the transmit timestamps on 2876 the receiving side. 2877 2878 This seems to be a very old problem, dating back to at least 2879 xntp3.3wy. It's also in the NTPv3 (RFC 1305) and NTPv4 (RFC 5905) 2880 specifications, so other NTP implementations with support for 2881 symmetric associations and authentication may be vulnerable too. 2882 An update to the NTP RFC to correct this error is in-process. 2883 Mitigation: 2884 Upgrade to 4.2.8p2, or later, from the NTP Project Download Page 2885 or the NTP Public Services Project Download Page 2886 Note that for users of autokey, this specific style of MITM attack 2887 is simply a long-known potential problem. 2888 Configure ntpd with appropriate time sources and monitor ntpd. 2889 Alert your staff if problems are detected. 2890 Credit: This issue was discovered by Miroslav Lichvar, of Red Hat. 2891 2892* New script: update-leap 2893The update-leap script will verify and if necessary, update the 2894leap-second definition file. 2895It requires the following commands in order to work: 2896 2897 wget logger tr sed shasum 2898 2899Some may choose to run this from cron. It needs more portability testing. 2900 2901Bug Fixes and Improvements: 2902 2903* [Bug 1787] DCF77's formerly "antenna" bit is "call bit" since 2003. 2904* [Bug 1960] setsockopt IPV6_MULTICAST_IF: Invalid argument. 2905* [Bug 2346] "graceful termination" signals do not do peer cleanup. 2906* [Bug 2728] See if C99-style structure initialization works. 2907* [Bug 2747] Upgrade libevent to 2.1.5-beta. 2908* [Bug 2749] ntp/lib/NTP/Util.pm needs update for ntpq -w, IPv6, .POOL. . 2909* [Bug 2751] jitter.h has stale copies of l_fp macros. 2910* [Bug 2756] ntpd hangs in startup with gcc 3.3.5 on ARM. 2911* [Bug 2757] Quiet compiler warnings. 2912* [Bug 2759] Expose nonvolatile/clk_wander_threshold to ntpq. 2913* [Bug 2763] Allow different thresholds for forward and backward steps. 2914* [Bug 2766] ntp-keygen output files should not be world-readable. 2915* [Bug 2767] ntp-keygen -M should symlink to ntp.keys. 2916* [Bug 2771] nonvolatile value is documented in wrong units. 2917* [Bug 2773] Early leap announcement from Palisade/Thunderbolt 2918* [Bug 2774] Unreasonably verbose printout - leap pending/warning 2919* [Bug 2775] ntp-keygen.c fails to compile under Windows. 2920* [Bug 2777] Fixed loops and decoding of Meinberg GPS satellite info. 2921 Removed non-ASCII characters from some copyright comments. 2922 Removed trailing whitespace. 2923 Updated definitions for Meinberg clocks from current Meinberg header files. 2924 Now use C99 fixed-width types and avoid non-ASCII characters in comments. 2925 Account for updated definitions pulled from Meinberg header files. 2926 Updated comments on Meinberg GPS receivers which are not only called GPS16x. 2927 Replaced some constant numbers by defines from ntp_calendar.h 2928 Modified creation of parse-specific variables for Meinberg devices 2929 in gps16x_message(). 2930 Reworked mk_utcinfo() to avoid printing of ambiguous leap second dates. 2931 Modified mbg_tm_str() which now expexts an additional parameter controlling 2932 if the time status shall be printed. 2933* [Sec 2779] ntpd accepts unauthenticated packets with symmetric key crypto. 2934* [Sec 2781] Authentication doesn't protect symmetric associations against 2935 DoS attacks. 2936* [Bug 2783] Quiet autoconf warnings about missing AC_LANG_SOURCE. 2937* [Bug 2789] Quiet compiler warnings from libevent. 2938* [Bug 2790] If ntpd sets the Windows MM timer highest resolution 2939 pause briefly before measuring system clock precision to yield 2940 correct results. 2941* Comment from Juergen Perlinger in ntp_calendar.c to make the code clearer. 2942* Use predefined function types for parse driver functions 2943 used to set up function pointers. 2944 Account for changed prototype of parse_inp_fnc_t functions. 2945 Cast parse conversion results to appropriate types to avoid 2946 compiler warnings. 2947 Let ioctl() for Windows accept a (void *) to avoid compiler warnings 2948 when called with pointers to different types. 2949 2950--- 2951NTP 4.2.8p1 (Harlan Stenn <stenn@ntp.org>, 2015/02/04) 2952 2953Focus: Security and Bug fixes, enhancements. 2954 2955Severity: HIGH 2956 2957In addition to bug fixes and enhancements, this release fixes the 2958following high-severity vulnerabilities: 2959 2960* vallen is not validated in several places in ntp_crypto.c, leading 2961 to a potential information leak or possibly a crash 2962 2963 References: Sec 2671 / CVE-2014-9297 / VU#852879 2964 Affects: All NTP4 releases before 4.2.8p1 that are running autokey. 2965 CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5 2966 Date Resolved: Stable (4.2.8p1) 04 Feb 2015 2967 Summary: The vallen packet value is not validated in several code 2968 paths in ntp_crypto.c which can lead to information leakage 2969 or perhaps a crash of the ntpd process. 2970 Mitigation - any of: 2971 Upgrade to 4.2.8p1, or later, from the NTP Project Download Page 2972 or the NTP Public Services Project Download Page. 2973 Disable Autokey Authentication by removing, or commenting out, 2974 all configuration directives beginning with the "crypto" 2975 keyword in your ntp.conf file. 2976 Credit: This vulnerability was discovered by Stephen Roettger of the 2977 Google Security Team, with additional cases found by Sebastian 2978 Krahmer of the SUSE Security Team and Harlan Stenn of Network 2979 Time Foundation. 2980 2981* ::1 can be spoofed on some OSes, so ACLs based on IPv6 ::1 addresses 2982 can be bypassed. 2983 2984 References: Sec 2672 / CVE-2014-9298 / VU#852879 2985 Affects: All NTP4 releases before 4.2.8p1, under at least some 2986 versions of MacOS and Linux. *BSD has not been seen to be vulnerable. 2987 CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:C) Base Score: 9 2988 Date Resolved: Stable (4.2.8p1) 04 Feb 2014 2989 Summary: While available kernels will prevent 127.0.0.1 addresses 2990 from "appearing" on non-localhost IPv4 interfaces, some kernels 2991 do not offer the same protection for ::1 source addresses on 2992 IPv6 interfaces. Since NTP's access control is based on source 2993 address and localhost addresses generally have no restrictions, 2994 an attacker can send malicious control and configuration packets 2995 by spoofing ::1 addresses from the outside. Note Well: This is 2996 not really a bug in NTP, it's a problem with some OSes. If you 2997 have one of these OSes where ::1 can be spoofed, ALL ::1 -based 2998 ACL restrictions on any application can be bypassed! 2999 Mitigation: 3000 Upgrade to 4.2.8p1, or later, from the NTP Project Download Page 3001 or the NTP Public Services Project Download Page 3002 Install firewall rules to block packets claiming to come from 3003 ::1 from inappropriate network interfaces. 3004 Credit: This vulnerability was discovered by Stephen Roettger of 3005 the Google Security Team. 3006 3007Additionally, over 30 bugfixes and improvements were made to the codebase. 3008See the ChangeLog for more information. 3009 3010--- 3011NTP 4.2.8 (Harlan Stenn <stenn@ntp.org>, 2014/12/18) 3012 3013Focus: Security and Bug fixes, enhancements. 3014 3015Severity: HIGH 3016 3017In addition to bug fixes and enhancements, this release fixes the 3018following high-severity vulnerabilities: 3019 3020************************** vv NOTE WELL vv ***************************** 3021 3022The vulnerabilities listed below can be significantly mitigated by 3023following the BCP of putting 3024 3025 restrict default ... noquery 3026 3027in the ntp.conf file. With the exception of: 3028 3029 receive(): missing return on error 3030 References: Sec 2670 / CVE-2014-9296 / VU#852879 3031 3032below (which is a limited-risk vulnerability), none of the recent 3033vulnerabilities listed below can be exploited if the source IP is 3034restricted from sending a 'query'-class packet by your ntp.conf file. 3035 3036************************** ^^ NOTE WELL ^^ ***************************** 3037 3038* Weak default key in config_auth(). 3039 3040 References: [Sec 2665] / CVE-2014-9293 / VU#852879 3041 CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3 3042 Vulnerable Versions: all releases prior to 4.2.7p11 3043 Date Resolved: 28 Jan 2010 3044 3045 Summary: If no 'auth' key is set in the configuration file, ntpd 3046 would generate a random key on the fly. There were two 3047 problems with this: 1) the generated key was 31 bits in size, 3048 and 2) it used the (now weak) ntp_random() function, which was 3049 seeded with a 32-bit value and could only provide 32 bits of 3050 entropy. This was sufficient back in the late 1990s when the 3051 code was written. Not today. 3052 3053 Mitigation - any of: 3054 - Upgrade to 4.2.7p11 or later. 3055 - Follow BCP and put 'restrict ... noquery' in your ntp.conf file. 3056 3057 Credit: This vulnerability was noticed in ntp-4.2.6 by Neel Mehta 3058 of the Google Security Team. 3059 3060* Non-cryptographic random number generator with weak seed used by 3061 ntp-keygen to generate symmetric keys. 3062 3063 References: [Sec 2666] / CVE-2014-9294 / VU#852879 3064 CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3 3065 Vulnerable Versions: All NTP4 releases before 4.2.7p230 3066 Date Resolved: Dev (4.2.7p230) 01 Nov 2011 3067 3068 Summary: Prior to ntp-4.2.7p230 ntp-keygen used a weak seed to 3069 prepare a random number generator that was of good quality back 3070 in the late 1990s. The random numbers produced was then used to 3071 generate symmetric keys. In ntp-4.2.8 we use a current-technology 3072 cryptographic random number generator, either RAND_bytes from 3073 OpenSSL, or arc4random(). 3074 3075 Mitigation - any of: 3076 - Upgrade to 4.2.7p230 or later. 3077 - Follow BCP and put 'restrict ... noquery' in your ntp.conf file. 3078 3079 Credit: This vulnerability was discovered in ntp-4.2.6 by 3080 Stephen Roettger of the Google Security Team. 3081 3082* Buffer overflow in crypto_recv() 3083 3084 References: Sec 2667 / CVE-2014-9295 / VU#852879 3085 CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5 3086 Versions: All releases before 4.2.8 3087 Date Resolved: Stable (4.2.8) 18 Dec 2014 3088 3089 Summary: When Autokey Authentication is enabled (i.e. the ntp.conf 3090 file contains a 'crypto pw ...' directive) a remote attacker 3091 can send a carefully crafted packet that can overflow a stack 3092 buffer and potentially allow malicious code to be executed 3093 with the privilege level of the ntpd process. 3094 3095 Mitigation - any of: 3096 - Upgrade to 4.2.8, or later, or 3097 - Disable Autokey Authentication by removing, or commenting out, 3098 all configuration directives beginning with the crypto keyword 3099 in your ntp.conf file. 3100 3101 Credit: This vulnerability was discovered by Stephen Roettger of the 3102 Google Security Team. 3103 3104* Buffer overflow in ctl_putdata() 3105 3106 References: Sec 2668 / CVE-2014-9295 / VU#852879 3107 CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5 3108 Versions: All NTP4 releases before 4.2.8 3109 Date Resolved: Stable (4.2.8) 18 Dec 2014 3110 3111 Summary: A remote attacker can send a carefully crafted packet that 3112 can overflow a stack buffer and potentially allow malicious 3113 code to be executed with the privilege level of the ntpd process. 3114 3115 Mitigation - any of: 3116 - Upgrade to 4.2.8, or later. 3117 - Follow BCP and put 'restrict ... noquery' in your ntp.conf file. 3118 3119 Credit: This vulnerability was discovered by Stephen Roettger of the 3120 Google Security Team. 3121 3122* Buffer overflow in configure() 3123 3124 References: Sec 2669 / CVE-2014-9295 / VU#852879 3125 CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5 3126 Versions: All NTP4 releases before 4.2.8 3127 Date Resolved: Stable (4.2.8) 18 Dec 2014 3128 3129 Summary: A remote attacker can send a carefully crafted packet that 3130 can overflow a stack buffer and potentially allow malicious 3131 code to be executed with the privilege level of the ntpd process. 3132 3133 Mitigation - any of: 3134 - Upgrade to 4.2.8, or later. 3135 - Follow BCP and put 'restrict ... noquery' in your ntp.conf file. 3136 3137 Credit: This vulnerability was discovered by Stephen Roettger of the 3138 Google Security Team. 3139 3140* receive(): missing return on error 3141 3142 References: Sec 2670 / CVE-2014-9296 / VU#852879 3143 CVSS: (AV:N/AC:L/Au:N/C:N/I:N/A:P) Base Score: 5.0 3144 Versions: All NTP4 releases before 4.2.8 3145 Date Resolved: Stable (4.2.8) 18 Dec 2014 3146 3147 Summary: Code in ntp_proto.c:receive() was missing a 'return;' in 3148 the code path where an error was detected, which meant 3149 processing did not stop when a specific rare error occurred. 3150 We haven't found a way for this bug to affect system integrity. 3151 If there is no way to affect system integrity the base CVSS 3152 score for this bug is 0. If there is one avenue through which 3153 system integrity can be partially affected, the base score 3154 becomes a 5. If system integrity can be partially affected 3155 via all three integrity metrics, the CVSS base score become 7.5. 3156 3157 Mitigation - any of: 3158 - Upgrade to 4.2.8, or later, 3159 - Remove or comment out all configuration directives 3160 beginning with the crypto keyword in your ntp.conf file. 3161 3162 Credit: This vulnerability was discovered by Stephen Roettger of the 3163 Google Security Team. 3164 3165See http://support.ntp.org/security for more information. 3166 3167New features / changes in this release: 3168 3169Important Changes 3170 3171* Internal NTP Era counters 3172 3173The internal counters that track the "era" (range of years) we are in 3174rolls over every 136 years'. The current "era" started at the stroke of 3175midnight on 1 Jan 1900, and ends just before the stroke of midnight on 31761 Jan 2036. 3177In the past, we have used the "midpoint" of the range to decide which 3178era we were in. Given the longevity of some products, it became clear 3179that it would be more functional to "look back" less, and "look forward" 3180more. We now compile a timestamp into the ntpd executable and when we 3181get a timestamp we us the "built-on" to tell us what era we are in. 3182This check "looks back" 10 years, and "looks forward" 126 years. 3183 3184* ntpdc responses disabled by default 3185 3186Dave Hart writes: 3187 3188For a long time, ntpq and its mostly text-based mode 6 (control) 3189protocol have been preferred over ntpdc and its mode 7 (private 3190request) protocol for runtime queries and configuration. There has 3191been a goal of deprecating ntpdc, previously held back by numerous 3192capabilities exposed by ntpdc with no ntpq equivalent. I have been 3193adding commands to ntpq to cover these cases, and I believe I've 3194covered them all, though I've not compared command-by-command 3195recently. 3196 3197As I've said previously, the binary mode 7 protocol involves a lot of 3198hand-rolled structure layout and byte-swapping code in both ntpd and 3199ntpdc which is hard to get right. As ntpd grows and changes, the 3200changes are difficult to expose via ntpdc while maintaining forward 3201and backward compatibility between ntpdc and ntpd. In contrast, 3202ntpq's text-based, label=value approach involves more code reuse and 3203allows compatible changes without extra work in most cases. 3204 3205Mode 7 has always been defined as vendor/implementation-specific while 3206mode 6 is described in RFC 1305 and intended to be open to interoperate 3207with other implementations. There is an early draft of an updated 3208mode 6 description that likely will join the other NTPv4 RFCs 3209eventually. (http://tools.ietf.org/html/draft-odonoghue-ntpv4-control-01) 3210 3211For these reasons, ntpd 4.2.7p230 by default disables processing of 3212ntpdc queries, reducing ntpd's attack surface and functionally 3213deprecating ntpdc. If you are in the habit of using ntpdc for certain 3214operations, please try the ntpq equivalent. If there's no equivalent, 3215please open a bug report at http://bugs.ntp.org./ 3216 3217In addition to the above, over 1100 issues have been resolved between 3218the 4.2.6 branch and 4.2.8. The ChangeLog file in the distribution 3219lists these. 3220 3221--- 3222NTP 4.2.6p5 (Harlan Stenn <stenn@ntp.org>, 2011/12/24) 3223 3224Focus: Bug fixes 3225 3226Severity: Medium 3227 3228This is a recommended upgrade. 3229 3230This release updates sys_rootdisp and sys_jitter calculations to match the 3231RFC specification, fixes a potential IPv6 address matching error for the 3232"nic" and "interface" configuration directives, suppresses the creation of 3233extraneous ephemeral associations for certain broadcastclient and 3234multicastclient configurations, cleans up some ntpq display issues, and 3235includes improvements to orphan mode, minor bugs fixes and code clean-ups. 3236 3237New features / changes in this release: 3238 3239ntpd 3240 3241 * Updated "nic" and "interface" IPv6 address handling to prevent 3242 mismatches with localhost [::1] and wildcard [::] which resulted from 3243 using the address/prefix format (e.g. fe80::/64) 3244 * Fix orphan mode stratum incorrectly counting to infinity 3245 * Orphan parent selection metric updated to includes missing ntohl() 3246 * Non-printable stratum 16 refid no longer sent to ntp 3247 * Duplicate ephemeral associations suppressed for broadcastclient and 3248 multicastclient without broadcastdelay 3249 * Exclude undetermined sys_refid from use in loopback TEST12 3250 * Exclude MODE_SERVER responses from KoD rate limiting 3251 * Include root delay in clock_update() sys_rootdisp calculations 3252 * get_systime() updated to exclude sys_residual offset (which only 3253 affected bits "below" sys_tick, the precision threshold) 3254 * sys.peer jitter weighting corrected in sys_jitter calculation 3255 3256ntpq 3257 3258 * -n option extended to include the billboard "server" column 3259 * IPv6 addresses in the local column truncated to prevent overruns 3260 3261--- 3262NTP 4.2.6p4 (Harlan Stenn <stenn@ntp.org>, 2011/09/22) 3263 3264Focus: Bug fixes and portability improvements 3265 3266Severity: Medium 3267 3268This is a recommended upgrade. 3269 3270This release includes build infrastructure updates, code 3271clean-ups, minor bug fixes, fixes for a number of minor 3272ref-clock issues, and documentation revisions. 3273 3274Portability improvements affect AIX, HP-UX, Linux, OS X and 64-bit time_t. 3275 3276New features / changes in this release: 3277 3278Build system 3279 3280* Fix checking for struct rtattr 3281* Update config.guess and config.sub for AIX 3282* Upgrade required version of autogen and libopts for building 3283 from our source code repository 3284 3285ntpd 3286 3287* Back-ported several fixes for Coverity warnings from ntp-dev 3288* Fix a rare boundary condition in UNLINK_EXPR_SLIST() 3289* Allow "logconfig =allall" configuration directive 3290* Bind tentative IPv6 addresses on Linux 3291* Correct WWVB/Spectracom driver to timestamp CR instead of LF 3292* Improved tally bit handling to prevent incorrect ntpq peer status reports 3293* Exclude the Undisciplined Local Clock and ACTS drivers from the initial 3294 candidate list unless they are designated a "prefer peer" 3295* Prevent the consideration of Undisciplined Local Clock or ACTS drivers for 3296 selection during the 'tos orphanwait' period 3297* Prefer an Orphan Mode Parent over the Undisciplined Local Clock or ACTS 3298 drivers 3299* Improved support of the Parse Refclock trusttime flag in Meinberg mode 3300* Back-port utility routines from ntp-dev: mprintf(), emalloc_zero() 3301* Added the NTPD_TICKADJ_PPM environment variable for specifying baseline 3302 clock slew on Microsoft Windows 3303* Code cleanup in libntpq 3304 3305ntpdc 3306 3307* Fix timerstats reporting 3308 3309ntpdate 3310 3311* Reduce time required to set clock 3312* Allow a timeout greater than 2 seconds 3313 3314sntp 3315 3316* Backward incompatible command-line option change: 3317 -l/--filelog changed -l/--logfile (to be consistent with ntpd) 3318 3319Documentation 3320 3321* Update html2man. Fix some tags in the .html files 3322* Distribute ntp-wait.html 3323 3324--- 3325NTP 4.2.6p3 (Harlan Stenn <stenn@ntp.org>, 2011/01/03) 3326 3327Focus: Bug fixes and portability improvements 3328 3329Severity: Medium 3330 3331This is a recommended upgrade. 3332 3333This release includes build infrastructure updates, code 3334clean-ups, minor bug fixes, fixes for a number of minor 3335ref-clock issues, and documentation revisions. 3336 3337Portability improvements in this release affect AIX, Atari FreeMiNT, 3338FreeBSD4, Linux and Microsoft Windows. 3339 3340New features / changes in this release: 3341 3342Build system 3343* Use lsb_release to get information about Linux distributions. 3344* 'test' is in /usr/bin (instead of /bin) on some systems. 3345* Basic sanity checks for the ChangeLog file. 3346* Source certain build files with ./filename for systems without . in PATH. 3347* IRIX portability fix. 3348* Use a single copy of the "libopts" code. 3349* autogen/libopts upgrade. 3350* configure.ac m4 quoting cleanup. 3351 3352ntpd 3353* Do not bind to IN6_IFF_ANYCAST addresses. 3354* Log the reason for exiting under Windows. 3355* Multicast fixes for Windows. 3356* Interpolation fixes for Windows. 3357* IPv4 and IPv6 Multicast fixes. 3358* Manycast solicitation fixes and general repairs. 3359* JJY refclock cleanup. 3360* NMEA refclock improvements. 3361* Oncore debug message cleanup. 3362* Palisade refclock now builds under Linux. 3363* Give RAWDCF more baud rates. 3364* Support Truetime Satellite clocks under Windows. 3365* Support Arbiter 1093C Satellite clocks under Windows. 3366* Make sure that the "filegen" configuration command defaults to "enable". 3367* Range-check the status codes (plus other cleanup) in the RIPE-NCC driver. 3368* Prohibit 'includefile' directive in remote configuration command. 3369* Fix 'nic' interface bindings. 3370* Fix the way we link with openssl if openssl is installed in the base 3371 system. 3372 3373ntp-keygen 3374* Fix -V coredump. 3375* OpenSSL version display cleanup. 3376 3377ntpdc 3378* Many counters should be treated as unsigned. 3379 3380ntpdate 3381* Do not ignore replies with equal receive and transmit timestamps. 3382 3383ntpq 3384* libntpq warning cleanup. 3385 3386ntpsnmpd 3387* Correct SNMP type for "precision" and "resolution". 3388* Update the MIB from the draft version to RFC-5907. 3389 3390sntp 3391* Display timezone offset when showing time for sntp in the local 3392 timezone. 3393* Pay proper attention to RATE KoD packets. 3394* Fix a miscalculation of the offset. 3395* Properly parse empty lines in the key file. 3396* Logging cleanup. 3397* Use tv_usec correctly in set_time(). 3398* Documentation cleanup. 3399 3400--- 3401NTP 4.2.6p2 (Harlan Stenn <stenn@ntp.org>, 2010/07/08) 3402 3403Focus: Bug fixes and portability improvements 3404 3405Severity: Medium 3406 3407This is a recommended upgrade. 3408 3409This release includes build infrastructure updates, code 3410clean-ups, minor bug fixes, fixes for a number of minor 3411ref-clock issues, improved KOD handling, OpenSSL related 3412updates and documentation revisions. 3413 3414Portability improvements in this release affect Irix, Linux, 3415Mac OS, Microsoft Windows, OpenBSD and QNX6 3416 3417New features / changes in this release: 3418 3419ntpd 3420* Range syntax for the trustedkey configuration directive 3421* Unified IPv4 and IPv6 restrict lists 3422 3423ntpdate 3424* Rate limiting and KOD handling 3425 3426ntpsnmpd 3427* default connection to net-snmpd via a unix-domain socket 3428* command-line 'socket name' option 3429 3430ntpq / ntpdc 3431* support for the "passwd ..." syntax 3432* key-type specific password prompts 3433 3434sntp 3435* MD5 authentication of an ntpd 3436* Broadcast and crypto 3437* OpenSSL support 3438 3439--- 3440NTP 4.2.6p1 (Harlan Stenn <stenn@ntp.org>, 2010/04/09) 3441 3442Focus: Bug fixes, portability fixes, and documentation improvements 3443 3444Severity: Medium 3445 3446This is a recommended upgrade. 3447 3448--- 3449NTP 4.2.6 (Harlan Stenn <stenn@ntp.org>, 2009/12/08) 3450 3451Focus: enhancements and bug fixes. 3452 3453--- 3454NTP 4.2.4p8 (Harlan Stenn <stenn@ntp.org>, 2009/12/08) 3455 3456Focus: Security Fixes 3457 3458Severity: HIGH 3459 3460This release fixes the following high-severity vulnerability: 3461 3462* [Sec 1331] DoS with mode 7 packets - CVE-2009-3563. 3463 3464 See http://support.ntp.org/security for more information. 3465 3466 NTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control utility. 3467 In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while routine NTP time 3468 transfers use modes 1 through 5. Upon receipt of an incorrect mode 7 3469 request or a mode 7 error response from an address which is not listed 3470 in a "restrict ... noquery" or "restrict ... ignore" statement, ntpd will 3471 reply with a mode 7 error response (and log a message). In this case: 3472 3473 * If an attacker spoofs the source address of ntpd host A in a 3474 mode 7 response packet sent to ntpd host B, both A and B will 3475 continuously send each other error responses, for as long as 3476 those packets get through. 3477 3478 * If an attacker spoofs an address of ntpd host A in a mode 7 3479 response packet sent to ntpd host A, A will respond to itself 3480 endlessly, consuming CPU and logging excessively. 3481 3482 Credit for finding this vulnerability goes to Robin Park and Dmitri 3483 Vinokurov of Alcatel-Lucent. 3484 3485THIS IS A STRONGLY RECOMMENDED UPGRADE. 3486 3487--- 3488ntpd now syncs to refclocks right away. 3489 3490Backward-Incompatible changes: 3491 3492ntpd no longer accepts '-v name' or '-V name' to define internal variables. 3493Use '--var name' or '--dvar name' instead. (Bug 817) 3494 3495--- 3496NTP 4.2.4p7 (Harlan Stenn <stenn@ntp.org>, 2009/05/04) 3497 3498Focus: Security and Bug Fixes 3499 3500Severity: HIGH 3501 3502This release fixes the following high-severity vulnerability: 3503 3504* [Sec 1151] Remote exploit if autokey is enabled. CVE-2009-1252 3505 3506 See http://support.ntp.org/security for more information. 3507 3508 If autokey is enabled (if ntp.conf contains a "crypto pw whatever" 3509 line) then a carefully crafted packet sent to the machine will cause 3510 a buffer overflow and possible execution of injected code, running 3511 with the privileges of the ntpd process (often root). 3512 3513 Credit for finding this vulnerability goes to Chris Ries of CMU. 3514 3515This release fixes the following low-severity vulnerabilities: 3516 3517* [Sec 1144] limited (two byte) buffer overflow in ntpq. CVE-2009-0159 3518 Credit for finding this vulnerability goes to Geoff Keating of Apple. 3519 3520* [Sec 1149] use SO_EXCLUSIVEADDRUSE on Windows 3521 Credit for finding this issue goes to Dave Hart. 3522 3523This release fixes a number of bugs and adds some improvements: 3524 3525* Improved logging 3526* Fix many compiler warnings 3527* Many fixes and improvements for Windows 3528* Adds support for AIX 6.1 3529* Resolves some issues under MacOS X and Solaris 3530 3531THIS IS A STRONGLY RECOMMENDED UPGRADE. 3532 3533--- 3534NTP 4.2.4p6 (Harlan Stenn <stenn@ntp.org>, 2009/01/07) 3535 3536Focus: Security Fix 3537 3538Severity: Low 3539 3540This release fixes oCERT.org's CVE-2009-0021, a vulnerability affecting 3541the OpenSSL library relating to the incorrect checking of the return 3542value of EVP_VerifyFinal function. 3543 3544Credit for finding this issue goes to the Google Security Team for 3545finding the original issue with OpenSSL, and to ocert.org for finding 3546the problem in NTP and telling us about it. 3547 3548This is a recommended upgrade. 3549--- 3550NTP 4.2.4p5 (Harlan Stenn <stenn@ntp.org>, 2008/08/17) 3551 3552Focus: Minor Bugfixes 3553 3554This release fixes a number of Windows-specific ntpd bugs and 3555platform-independent ntpdate bugs. A logging bugfix has been applied 3556to the ONCORE driver. 3557 3558The "dynamic" keyword and is now obsolete and deferred binding to local 3559interfaces is the new default. The minimum time restriction for the 3560interface update interval has been dropped. 3561 3562A number of minor build system and documentation fixes are included. 3563 3564This is a recommended upgrade for Windows. 3565 3566--- 3567NTP 4.2.4p4 (Harlan Stenn <stenn@ntp.org>, 2007/09/10) 3568 3569Focus: Minor Bugfixes 3570 3571This release updates certain copyright information, fixes several display 3572bugs in ntpdc, avoids SIGIO interrupting malloc(), cleans up file descriptor 3573shutdown in the parse refclock driver, removes some lint from the code, 3574stops accessing certain buffers immediately after they were freed, fixes 3575a problem with non-command-line specification of -6, and allows the loopback 3576interface to share addresses with other interfaces. 3577 3578--- 3579NTP 4.2.4p3 (Harlan Stenn <stenn@ntp.org>, 2007/06/29) 3580 3581Focus: Minor Bugfixes 3582 3583This release fixes a bug in Windows that made it difficult to 3584terminate ntpd under windows. 3585This is a recommended upgrade for Windows. 3586 3587--- 3588NTP 4.2.4p2 (Harlan Stenn <stenn@ntp.org>, 2007/06/19) 3589 3590Focus: Minor Bugfixes 3591 3592This release fixes a multicast mode authentication problem, 3593an error in NTP packet handling on Windows that could lead to 3594ntpd crashing, and several other minor bugs. Handling of 3595multicast interfaces and logging configuration were improved. 3596The required versions of autogen and libopts were incremented. 3597This is a recommended upgrade for Windows and multicast users. 3598 3599--- 3600NTP 4.2.4 (Harlan Stenn <stenn@ntp.org>, 2006/12/31) 3601 3602Focus: enhancements and bug fixes. 3603 3604Dynamic interface rescanning was added to simplify the use of ntpd in 3605conjunction with DHCP. GNU AutoGen is used for its command-line options 3606processing. Separate PPS devices are supported for PARSE refclocks, MD5 3607signatures are now provided for the release files. Drivers have been 3608added for some new ref-clocks and have been removed for some older 3609ref-clocks. This release also includes other improvements, documentation 3610and bug fixes. 3611 3612K&R C is no longer supported as of NTP-4.2.4. We are now aiming for ANSI 3613C support. 3614 3615--- 3616NTP 4.2.0 (Harlan Stenn <stenn@ntp.org>, 2003/10/15) 3617 3618Focus: enhancements and bug fixes. 3619