ntp: security bump to version 4.2.8p11
authorBaruch Siach <baruch@tkos.co.il>
Tue, 6 Mar 2018 17:00:47 +0000 (19:00 +0200)
committerPeter Korsgaard <peter@korsgaard.com>
Tue, 6 Mar 2018 18:03:26 +0000 (19:03 +0100)
commitda05d748057a98254a9c4fbd6afbc8ebf7e08afd
tree73584d37f9bec4c9d35410f66b1f10e53594cfad
parent74295b02d4b380e5267357be0ae1281c7410cdc2
ntp: security bump to version 4.2.8p11

Fixed or improved security issues:

  CVE-2016-1549 (fixed in 4.2.8p7; this release adds protection): A
  malicious authenticated peer can create arbitrarily-many ephemeral
  associations in order to win the clock selection algorithm

  CVE-2018-7182: Buffer read overrun leads to undefined behavior and
  information leak

  CVE-2018-7170: Multiple authenticated ephemeral associations

  CVE-2018-7184: Interleaved symmetric mode cannot recover from bad
  state

  CVE-2018-7185: Unauthenticated packet can reset authenticated
  interleaved association

  CVE-2018-7183: ntpq:decodearr() can write beyond its buffer limit

Drop patch #3. libntpq_a_CFLAGS now includes NTP_HARD_CFLAGS via
AM_CFLAGS.

Add license file hash.

Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
package/ntp/0003-ntpq-fpic.patch [deleted file]
package/ntp/ntp.hash
package/ntp/ntp.mk