xref: /netbsd-src/external/bsd/ntp/dist/NEWS (revision 6a9b3088d8d2341ca1454531d365c15fe9c1c589)
1NTP 4.2.4p8 (Harlan Stenn <stenn@ntp.org>, 2009/12/08)
2
3Focus: Security Fixes
4
5Severity: HIGH
6
7This release fixes the following high-severity vulnerability:
8
9* [Sec 1331] DoS with mode 7 packets - CVE-2009-3563.
10
11  See http://support.ntp.org/security for more information.
12
13  NTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control utility.
14  In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while routine NTP time
15  transfers use modes 1 through 5.  Upon receipt of an incorrect mode 7
16  request or a mode 7 error response from an address which is not listed
17  in a "restrict ... noquery" or "restrict ... ignore" statement, ntpd will
18  reply with a mode 7 error response (and log a message).  In this case:
19
20	* If an attacker spoofs the source address of ntpd host A in a
21	  mode 7 response packet sent to ntpd host B, both A and B will
22	  continuously send each other error responses, for as long as
23	  those packets get through.
24
25	* If an attacker spoofs an address of ntpd host A in a mode 7
26	  response packet sent to ntpd host A, A will respond to itself
27	  endlessly, consuming CPU and logging excessively.
28
29  Credit for finding this vulnerability goes to Robin Park and Dmitri
30  Vinokurov of Alcatel-Lucent.
31
32THIS IS A STRONGLY RECOMMENDED UPGRADE.
33
34---
35ntpd now syncs to refclocks right away.
36
37Backward-Incomatible changes:
38
39ntpd no longer accepts '-v name' or '-V name' to define internal variables.
40Use '--var name' or '--dvar name' instead. (Bug 817)
41
42---
43NTP 4.2.4p7 (Harlan Stenn <stenn@ntp.org>, 2009/05/04)
44
45Focus: Security and Bug Fixes
46
47Severity: HIGH
48
49This release fixes the following high-severity vulnerability:
50
51* [Sec 1151] Remote exploit if autokey is enabled.  CVE-2009-1252
52
53  See http://support.ntp.org/security for more information.
54
55  If autokey is enabled (if ntp.conf contains a "crypto pw whatever"
56  line) then a carefully crafted packet sent to the machine will cause
57  a buffer overflow and possible execution of injected code, running
58  with the privileges of the ntpd process (often root).
59
60  Credit for finding this vulnerability goes to Chris Ries of CMU.
61
62This release fixes the following low-severity vulnerabilities:
63
64* [Sec 1144] limited (two byte) buffer overflow in ntpq.  CVE-2009-0159
65  Credit for finding this vulnerability goes to Geoff Keating of Apple.
66
67* [Sec 1149] use SO_EXCLUSIVEADDRUSE on Windows
68  Credit for finding this issue goes to Dave Hart.
69
70This release fixes a number of bugs and adds some improvements:
71
72* Improved logging
73* Fix many compiler warnings
74* Many fixes and improvements for Windows
75* Adds support for AIX 6.1
76* Resolves some issues under MacOS X and Solaris
77
78THIS IS A STRONGLY RECOMMENDED UPGRADE.
79
80---
81NTP 4.2.4p6 (Harlan Stenn <stenn@ntp.org>, 2009/01/07)
82
83Focus: Security Fix
84
85Severity: Low
86
87This release fixes oCERT.org's CVE-2009-0021, a vulnerability affecting
88the OpenSSL library relating to the incorrect checking of the return
89value of EVP_VerifyFinal function.
90
91Credit for finding this issue goes to the Google Security Team for
92finding the original issue with OpenSSL, and to ocert.org for finding
93the problem in NTP and telling us about it.
94
95This is a recommended upgrade.
96---
97NTP 4.2.4p5 (Harlan Stenn <stenn@ntp.org>, 2008/08/17)
98
99Focus: Minor Bugfixes
100
101This release fixes a number of Windows-specific ntpd bugs and
102platform-independent ntpdate bugs. A logging bugfix has been applied
103to the ONCORE driver.
104
105The "dynamic" keyword and is now obsolete and deferred binding to local
106interfaces is the new default. The minimum time restriction for the
107interface update interval has been dropped.
108
109A number of minor build system and documentation fixes are included.
110
111This is a recommended upgrade for Windows.
112
113---
114NTP 4.2.4p4 (Harlan Stenn <stenn@ntp.org>, 2007/09/10)
115
116Focus: Minor Bugfixes
117
118This release updates certain copyright information, fixes several display
119bugs in ntpdc, avoids SIGIO interrupting malloc(), cleans up file descriptor
120shutdown in the parse refclock driver, removes some lint from the code,
121stops accessing certain buffers immediately after they were freed, fixes
122a problem with non-command-line specification of -6, and allows the loopback
123interface to share addresses with other interfaces.
124
125---
126NTP 4.2.4p3 (Harlan Stenn <stenn@ntp.org>, 2007/06/29)
127
128Focus: Minor Bugfixes
129
130This release fixes a bug in Windows that made it difficult to
131terminate ntpd under windows.
132This is a recommended upgrade for Windows.
133
134---
135NTP 4.2.4p2 (Harlan Stenn <stenn@ntp.org>, 2007/06/19)
136
137Focus: Minor Bugfixes
138
139This release fixes a multicast mode authentication problem,
140an error in NTP packet handling on Windows that could lead to
141ntpd crashing, and several other minor bugs. Handling of
142multicast interfaces and logging configuration were improved.
143The required versions of autogen and libopts were incremented.
144This is a recommended upgrade for Windows and multicast users.
145
146---
147NTP 4.2.4 (Harlan Stenn <stenn@ntp.org>, 2006/12/31)
148
149Focus: enhancements and bug fixes.
150
151Dynamic interface rescanning was added to simplify the use of ntpd in
152conjunction with DHCP. GNU AutoGen is used for its command-line options
153processing. Separate PPS devices are supported for PARSE refclocks, MD5
154signatures are now provided for the release files. Drivers have been
155added for some new ref-clocks and have been removed for some older
156ref-clocks. This release also includes other improvements, documentation
157and bug fixes.
158
159K&R C is no longer supported as of NTP-4.2.4. We are now aiming for ANSI
160C support.
161
162---
163NTP 4.2.0 (Harlan Stenn <stenn@ntp.org>, 2003/10/15)
164
165Focus: enhancements and bug fixes.
166