From owner-svn-ports-head@freebsd.org Wed Apr 27 04:43:32 2016 Return-Path: Delivered-To: svn-ports-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 89DE5B1CB49; Wed, 27 Apr 2016 04:43:32 +0000 (UTC) (envelope-from delphij@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 63FC818B5; Wed, 27 Apr 2016 04:43:32 +0000 (UTC) (envelope-from delphij@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id u3R4hV5e087897; Wed, 27 Apr 2016 04:43:31 GMT (envelope-from delphij@FreeBSD.org) Received: (from delphij@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id u3R4hVOK087896; Wed, 27 Apr 2016 04:43:31 GMT (envelope-from delphij@FreeBSD.org) Message-Id: <201604270443.u3R4hVOK087896@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: delphij set sender to delphij@FreeBSD.org using -f From: Xin LI Date: Wed, 27 Apr 2016 04:43:31 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r414086 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 27 Apr 2016 04:43:32 -0000 Author: delphij Date: Wed Apr 27 04:43:31 2016 New Revision: 414086 URL: https://svnweb.freebsd.org/changeset/ports/414086 Log: Document NTP multiple vulnerabilities. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Wed Apr 27 01:18:07 2016 (r414085) +++ head/security/vuxml/vuln.xml Wed Apr 27 04:43:31 2016 (r414086) @@ -58,6 +58,93 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + ntp -- multiple vulnerabilities + + + ntp + 4.2.8p7 + + + ntp-devel + 4.3.92 + + + + +

Network Time Foundation reports:

+
+

NTF's NTP Project has been notified of the following low- + and medium-severity vulnerabilities that are fixed in + ntp-4.2.8p7, released on Tuesday, 26 April 2016:

+
    +
  • Bug 3020 / CVE-2016-1551: Refclock impersonation + vulnerability, AKA: refclock-peering. Reported by + Matt Street and others of Cisco ASIG
  • +
  • Bug 3012 / CVE-2016-1549: Sybil vulnerability: + ephemeral association attack, AKA: ntp-sybil - + MITIGATION ONLY. Reported by Matthew Van Gundy + of Cisco ASIG
  • +
  • Bug 3011 / CVE-2016-2516: Duplicate IPs on + unconfig directives will cause an assertion botch. + Reported by Yihan Lian of the Cloud Security Team, + Qihoo 360
  • +
  • Bug 3010 / CVE-2016-2517: Remote configuration + trustedkey/requestkey values are not properly + validated. Reported by Yihan Lian of the Cloud + Security Team, Qihoo 360
  • +
  • Bug 3009 / CVE-2016-2518: Crafted addpeer with + hmode > 7 causes array wraparound with MATCH_ASSOC. + Reported by Yihan Lian of the Cloud Security Team, + Qihoo 360
  • +
  • Bug 3008 / CVE-2016-2519: ctl_getitem() return + value not always checked. Reported by Yihan Lian + of the Cloud Security Team, Qihoo 360
  • +
  • Bug 3007 / CVE-2016-1547: Validate crypto-NAKs, + AKA: nak-dos. Reported by Stephen Gray and + Matthew Van Gundy of Cisco ASIG
  • +
  • Bug 2978 / CVE-2016-1548: Interleave-pivot - + MITIGATION ONLY. Reported by Miroslav Lichvar of + RedHat and separately by Jonathan Gardner of + Cisco ASIG.
  • +
  • Bug 2952 / CVE-2015-7704: KoD fix: peer + associations were broken by the fix for + NtpBug2901, AKA: Symmetric active/passive mode + is broken. Reported by Michael Tatarinov, + NTP Project Developer Volunteer
  • +
  • Bug 2945 / Bug 2901 / CVE-2015-8138: Zero + Origin Timestamp Bypass, AKA: Additional KoD Checks. + Reported by Jonathan Gardner of Cisco ASIG
  • +
  • Bug 2879 / CVE-2016-1550: Improve NTP security + against buffer comparison timing attacks, + authdecrypt-timing, AKA: authdecrypt-timing. + Reported independently by Loganaden Velvindron, + and Matthew Van Gundy and Stephen Gray of + Cisco ASIG.
  • +
+
+ +
+ + CVE-2015-7704 + CVE-2015-8138 + CVE-2016-1547 + CVE-2016-1548 + CVE-2016-1549 + CVE-2016-1550 + CVE-2016-1551 + CVE-2016-2516 + CVE-2016-2517 + CVE-2016-2518 + CVE-2016-2519 + http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security + + + 2016-04-26 + 2016-04-27 + +
+ mozilla -- multiple vulnerabilities