~paelzer/ubuntu/+source/ntp:bug-1706818-ntpdate-ntp-conflict-xenial

Last commit made on 2017-09-06
Get this branch:
git clone -b bug-1706818-ntpdate-ntp-conflict-xenial https://git.launchpad.net/~paelzer/ubuntu/+source/ntp
Only Christian Ehrhardt  can upload to this branch. If you are Christian Ehrhardt  please log in for upload directions.

Branch merges

Branch information

Name:
bug-1706818-ntpdate-ntp-conflict-xenial
Repository:
lp:~paelzer/ubuntu/+source/ntp

Recent commits

eceef96... by Christian Ehrhardt 

changelog: clarify the changes made to fix (LP: #1706818)

Signed-off-by: Christian Ehrhardt <email address hidden>

956a5e5... by Christian Ehrhardt 

changelog: d/ntp.init: fix lock path to match the ntpdate ifup hook (LP: #1706818)

Signed-off-by: Christian Ehrhardt <email address hidden>

9a14fb6... by Christian Ehrhardt 

d/ntp.init: fix lock path to match the ntpdate ifup hook (LP: #1706818)

Signed-off-by: Christian Ehrhardt <email address hidden>

040c8f8... by Christian Ehrhardt 

Update ubuntu/xenial-devel from 1:4.2.8p4+dfsg-3ubuntu5.5 to 1:4.2.8p4+dfsg-3ubuntu5.6

Prior ubuntu/xenial-devel commit: a0d9f36ad3d31a05949346221cfdd7446e93f18e
New ubuntu/xenial-devel commit: 04eb38b1519a63ab73b3fdb1b4aac9b22bce73fe

04eb38b... by Christian Ehrhardt 

Import patches-unapplied version 1:4.2.8p4+dfsg-3ubuntu5.6 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Publish parent: 5b16c5a4ce80ef46a96a7f70836e426acce268be
Changelog parent: 7c6911561bb419ad66e6b5247c70bc0976739b2b

New changelog entries:
  * debian/ntpdate.if-up: Drop delta to stop/start service around ntpdate
    updates - fixes ntp restart storms due to network changes, fixes
    accidential start of ntp, avoids issues of ntpdate jumping too far while
    running ntp was supposed to drift (LP: #1593907)

a0d9f36... by Marc Deslauriers

Update ubuntu/xenial-devel from 1:4.2.8p4+dfsg-3ubuntu5.4 to 1:4.2.8p4+dfsg-3ubuntu5.5

Prior ubuntu/xenial-devel commit: 19bfc87eaaf4f2de5f415a8b15b8395d7daa4b0a
New ubuntu/xenial-devel commit: 7c6911561bb419ad66e6b5247c70bc0976739b2b

7c69115... by Marc Deslauriers

Import patches-unapplied version 1:4.2.8p4+dfsg-3ubuntu5.5 to ubuntu/xenial-security

Imported using git-ubuntu import.

Publish parent: 0855e5bd34867af94d84a34a8aa86c71edc039dd
Changelog parent: 5b16c5a4ce80ef46a96a7f70836e426acce268be

New changelog entries:
  * SECURITY UPDATE: DoS via large request data value
    - debian/patches/CVE-2016-2519.patch: check packet in
      ntpd/ntp_control.c.
    - CVE-2016-2519
  * SECURITY UPDATE: DoS via responses with a spoofed source address
    - debian/patches/CVE-2016-7426.patch: improve rate limiting in
      ntpd/ntp_proto.c.
    - CVE-2016-7426
  * SECURITY UPDATE: DoS via crafted broadcast mode packet
    - debian/patches/CVE-2016-7427-1.patch: improve replay prevention
      logic in ntpd/ntp_proto.c.
    - CVE-2016-7427
  * SECURITY UPDATE: DoS via poll interval in a broadcast packet
    - debian/patches/CVE-2016-7428.patch: ensure at least one poll interval
      has elapsed in ntpd/ntp_proto.c, include/ntp.h.
    - CVE-2016-7428
  * SECURITY UPDATE: DoS via response for a source to an interface the
    source does not use
    - debian/patches/CVE-2016-7429-1.patch: add extra checks to
      ntpd/ntp_peer.c.
    - debian/patches/CVE-2016-7429-2.patch: check for NULL first in
      ntpd/ntp_peer.c.
    - debian/patches/CVE-2016-7429-3.patch: fix multicastclient regression
      in ntpd/ntp_peer.c.
    - CVE-2016-7429
  * SECURITY UPDATE: incorrect initial sync calculations
    - debian/patches/CVE-2016-7433.patch: use peer dispersion in
      ntpd/ntp_proto.c.
    - CVE-2016-7433
  * SECURITY UPDATE: DoS via crafted mrulist query
    - debian/patches/CVE-2016-7434.patch: added missing parameter
      validation to ntpd/ntp_control.c.
    - CVE-2016-7434
  * SECURITY UPDATE: traps can be set or unset via a crafted control mode
    packet
    - debian/patches/CVE-2016-9310.patch: require AUTH in
      ntpd/ntp_control.c.
    - CVE-2016-9310
  * SECURITY UPDATE: DoS when trap service is enabled
    - debian/patches/CVE-2016-9311.patch: make sure peer events are
      associated with a peer in ntpd/ntp_control.c.
    - CVE-2016-9311
  * SECURITY UPDATE: potential Overflows in ctl_put() functions
    - debian/patches/CVE-2017-6458.patch: check lengths in
      ntpd/ntp_control.c.
    - CVE-2017-6458
  * SECURITY UPDATE: overflow via long flagstr variable
    - debian/patches/CVE-2017-6460.patch: check length in ntpq/ntpq-subs.c.
    - CVE-2017-6460
  * SECURITY UPDATE: buffer overflow in DPTS refclock driver
    - debian/patches/CVE-2017-6462.patch: don't overrun buffer in
      ntpd/refclock_datum.c.
    - CVE-2017-6462
  * SECURITY UPDATE: DoS via invalid setting in a :config directive
    - debian/patches/CVE-2017-6463.patch: protect against overflow in
      ntpd/ntp_config.c.
    - CVE-2017-6463
  * SECURITY UPDATE: Dos via malformed mode configuration directive
    - debian/patches/CVE-2017-6464.patch: validate directives in
      ntpd/ntp_config.c, ntpd/ntp_proto.c.
    - CVE-2017-6464

5b16c5a... by Philip Roche

Import patches-unapplied version 1:4.2.8p4+dfsg-3ubuntu5.4 to ubuntu/xenial-proposed

Imported using git-ubuntu import.

Publish parent: 88c2ffdd3989dd6b46508212a3709f7c8e0eb938
Changelog parent: 0855e5bd34867af94d84a34a8aa86c71edc039dd

New changelog entries:
  * Fix ntp.dhcp to also check for pool and better handle spaces and tabs.
    (LP: #1656801)

19bfc87... by Philip Roche

Update ubuntu/xenial-devel from 1:4.2.8p4+dfsg-3ubuntu5.3 to 1:4.2.8p4+dfsg-3ubuntu5.4

Prior ubuntu/xenial-devel commit: 95c1650728ce4904aafb64dc110ce060556d3125
New ubuntu/xenial-devel commit: 5b16c5a4ce80ef46a96a7f70836e426acce268be

0855e5b... by Marc Deslauriers

Import patches-unapplied version 1:4.2.8p4+dfsg-3ubuntu5.3 to ubuntu/xenial-security

Imported using git-ubuntu import.

Publish parent: 52c847ce38c61819607d52a790b26e8004f7a724
Changelog parent: 88c2ffdd3989dd6b46508212a3709f7c8e0eb938

New changelog entries:
  * SECURITY UPDATE: Deja Vu replay attack on authenticated broadcast mode
    - debian/patches/CVE-2015-7973.patch: improve timestamp verification in
      include/ntp.h, ntpd/ntp_proto.c.
    - CVE-2015-7973
  * SECURITY UPDATE: impersonation between authenticated peers
    - debian/patches/CVE-2015-7974.patch: check key ID in ntpd/ntp_proto.c.
    - CVE-2015-7974
  * SECURITY UPDATE: ntpq buffer overflow
    - debian/patches/CVE-2015-7975.patch: add length check to ntpq/ntpq.c.
    - CVE-2015-7975
  * SECURITY UPDATE: ntpq saveconfig command allows dangerous characters in
    filenames
    - debian/patches/CVE-2015-7976.patch: check filename in
      ntpd/ntp_control.c.
    - CVE-2015-7976
  * SECURITY UPDATE: restrict list denial of service
    - debian/patches/CVE-2015-7977-7978.patch: improve restrict list
      processing in ntpd/ntp_request.c.
    - CVE-2015-7977
    - CVE-2015-7978
  * SECURITY UPDATE: authenticated broadcast mode off-path denial of
    service
    - debian/patches/CVE-2015-7979.patch: add more checks to
      ntpd/ntp_proto.c.
    - CVE-2015-7979
    - CVE-2016-1547
  * SECURITY UPDATE: Zero Origin Timestamp Bypass
    - debian/patches/CVE-2015-8138.patch: check p_org in ntpd/ntp_proto.c.
    - CVE-2015-8138
  * SECURITY UPDATE: potential infinite loop in ntpq
    - debian/patches/CVE-2015-8158.patch: add time checks to ntpdc/ntpdc.c,
      ntpq/ntpq.c.
    - CVE-2015-8158
  * SECURITY UPDATE: NTP statsdir cleanup cronjob insecure (LP: #1528050)
    - debian/ntp.cron.daily: fix security issues, patch thanks to halfdog!
    - CVE-2016-0727
  * SECURITY UPDATE: time spoofing via interleaved symmetric mode
    - debian/patches/CVE-2016-1548.patch: check for bogus packets in
      ntpd/ntp_proto.c.
    - CVE-2016-1548
  * SECURITY UPDATE: buffer comparison timing attacks
    - debian/patches/CVE-2016-1550.patch: use CRYPTO_memcmp in
      libntp/a_md5encrypt.c, sntp/crypto.c.
    - CVE-2016-1550
  * SECURITY UPDATE: DoS via duplicate IPs on unconfig directives
    - debian/patches/CVE-2016-2516.patch: improve logic in
      ntpd/ntp_request.c.
    - CVE-2016-2516
  * SECURITY UPDATE: denial of service via crafted addpeer
    - debian/patches/CVE-2016-2518.patch: check mode value in
      ntpd/ntp_request.c.
    - CVE-2016-2518
  * SECURITY UPDATE: denial of service via spoofed packets
    - debian/patches/CVE-2016-4954.patch: discard packet that fails tests
      in ntpd/ntp_proto.c.
    - CVE-2016-4954
  * SECURITY UPDATE: denial of service via spoofed crypto-NAK or incorrect
    MAC
    - debian/patches/CVE-2016-4955.patch: fix checks in ntpd/ntp_proto.c.
    - CVE-2016-4955
  * SECURITY UPDATE: denial of service via spoofed broadcast packet
    - debian/patches/CVE-2016-4956.patch: properly handle switch in
      broadcast interleaved mode in ntpd/ntp_proto.c.
    - CVE-2016-4956