Activity log for bug #1812458

Date Who What changed Old value New value Message
2019-01-18 23:28:54 Richard Laager bug added bug
2019-01-18 23:29:08 Richard Laager information type Private Security Public
2019-01-18 23:29:23 Richard Laager ntpsec (Ubuntu): assignee Richard Laager (rlaager)
2019-01-18 23:29:29 Richard Laager ntpsec (Ubuntu): status New Confirmed
2019-01-18 23:32:52 Richard Laager summary ntpsec CVE-2019-6442 CVE-2019-6443 CVE-2019-6444 CVE-2019-6445 Sync ntpsec 1.1.3+dfsg1-1 (universe) from Debian sid (main)
2019-01-18 23:35:44 Richard Laager description NTPsec < 1.1.3 has the following CVEs: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6442 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6443 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6444 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6445 I am the maintainer of ntpsec in Debian. Debian has 1.1.3. Ubuntu needs the following: - disco needs a sync from Debian. - cosmic needs the patches backported. - bionic needs the patches backported. I'm happy to do the work. BTW, these issues may impact the ntp package too, but I'm not sure that anyone (the original report, ntp upstream, or ntp in Debian) has evaluated that. For the sync request: I believe disco currently has 1.1.2+dfsg1-6. (packages.ubuntu.com is broken, so it's harder than normal for me to tell.) There are no Ubuntu changes for ntpsec in disco. 1.1.3+dfsg1-1 is the immediate next release in Debian. ntpsec (1.1.3+dfsg1-1) unstable; urgency=high * New upstream version (Closes: 919513) - Lots of typo fixes, documentation cleanups, test targets. - CVE-2019-6442: "An authenticated attacker can write one byte out of bounds in ntpd via a malformed config request, related to config_remotely in ntp_config.c, yyparse in ntp_parser.tab.c, and yyerror in ntp_parser.y." - CVE-2019-6443: "Because of a bug in ctl_getitem, there is a stack-based buffer over-read in read_sysvars in ntp_control.c in ntpd. - CVE-2019-6444: "process_control() in ntp_control.c has a stack-based buffer over-read because attacker-controlled data is dereferenced by ntohl() in ntpd." - CVE-2019-6445: "An authenticated attacker can cause a NULL pointer dereference and ntpd crash in ntp_control.c, related to ctl_getitem." * Drop debian/patches/fix-ntploggps.patch (merged upstream) * Refresh patches * Revert "Use python3-gps" At this time, python3-gps is only available in experimental. * Disable the waf PYTHON_GPS check * Update debian/copyright * Fix ntpdate.8 documentation of -B * Changes as of ntp_4.2.8p12+dfsg-3 have been merged as appropriate: - Update ntpdate.8 from ntpdate.html Thanks to Bernhard Schmidt <berni@debian.org> - Update ntpdate.README.Debian Thanks to Bernhard Schmidt <berni@debian.org> - As a notable exception, while the ntp package has removed the ntpdate hooks, I have not (yet?) done so in ntpsec. * Set Rules-Requires-Root: no * Sort debian/ntpsec.maintscript -- Richard Laager <rlaager@wiktel.com> Thu, 17 Jan 2019 04:17:46 -0600 ---- NTPsec < 1.1.3 has the following CVEs: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6442 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6443 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6444 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6445 I am the maintainer of ntpsec in Debian. Debian has 1.1.3. Ubuntu needs the following: - disco needs a sync from Debian. - cosmic needs the patches backported. - bionic needs the patches backported. I'm happy to do the work. BTW, these issues may impact the ntp package too, but I'm not sure that anyone (the original report, ntp upstream, or ntp in Debian) has evaluated that.
2019-01-18 23:35:58 Richard Laager bug added subscriber Ubuntu Sponsors Team
2019-01-19 02:18:14 Richard Laager attachment added The debdiff for Bionic https://bugs.launchpad.net/ubuntu/+source/ntpsec/+bug/1812458/+attachment/5230451/+files/bionic.debdiff
2019-01-19 02:18:30 Richard Laager attachment added The debdiff for Cosmic https://bugs.launchpad.net/ubuntu/+source/ntpsec/+bug/1812458/+attachment/5230452/+files/cosmic.debdiff
2019-01-19 02:18:45 Richard Laager ntpsec (Ubuntu): assignee Richard Laager (rlaager)
2019-01-22 23:01:32 Jeremy Bícha summary Sync ntpsec 1.1.3+dfsg1-1 (universe) from Debian sid (main) ntpsec security fixes for bionic & cosmic
2019-01-22 23:01:38 Jeremy Bícha removed subscriber Ubuntu Sponsors Team
2019-01-22 23:02:15 Jeremy Bícha description For the sync request: I believe disco currently has 1.1.2+dfsg1-6. (packages.ubuntu.com is broken, so it's harder than normal for me to tell.) There are no Ubuntu changes for ntpsec in disco. 1.1.3+dfsg1-1 is the immediate next release in Debian. ntpsec (1.1.3+dfsg1-1) unstable; urgency=high * New upstream version (Closes: 919513) - Lots of typo fixes, documentation cleanups, test targets. - CVE-2019-6442: "An authenticated attacker can write one byte out of bounds in ntpd via a malformed config request, related to config_remotely in ntp_config.c, yyparse in ntp_parser.tab.c, and yyerror in ntp_parser.y." - CVE-2019-6443: "Because of a bug in ctl_getitem, there is a stack-based buffer over-read in read_sysvars in ntp_control.c in ntpd. - CVE-2019-6444: "process_control() in ntp_control.c has a stack-based buffer over-read because attacker-controlled data is dereferenced by ntohl() in ntpd." - CVE-2019-6445: "An authenticated attacker can cause a NULL pointer dereference and ntpd crash in ntp_control.c, related to ctl_getitem." * Drop debian/patches/fix-ntploggps.patch (merged upstream) * Refresh patches * Revert "Use python3-gps" At this time, python3-gps is only available in experimental. * Disable the waf PYTHON_GPS check * Update debian/copyright * Fix ntpdate.8 documentation of -B * Changes as of ntp_4.2.8p12+dfsg-3 have been merged as appropriate: - Update ntpdate.8 from ntpdate.html Thanks to Bernhard Schmidt <berni@debian.org> - Update ntpdate.README.Debian Thanks to Bernhard Schmidt <berni@debian.org> - As a notable exception, while the ntp package has removed the ntpdate hooks, I have not (yet?) done so in ntpsec. * Set Rules-Requires-Root: no * Sort debian/ntpsec.maintscript -- Richard Laager <rlaager@wiktel.com> Thu, 17 Jan 2019 04:17:46 -0600 ---- NTPsec < 1.1.3 has the following CVEs: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6442 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6443 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6444 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6445 I am the maintainer of ntpsec in Debian. Debian has 1.1.3. Ubuntu needs the following: - disco needs a sync from Debian. - cosmic needs the patches backported. - bionic needs the patches backported. I'm happy to do the work. BTW, these issues may impact the ntp package too, but I'm not sure that anyone (the original report, ntp upstream, or ntp in Debian) has evaluated that. NTPsec < 1.1.3 has the following CVEs: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6442 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6443 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6444 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6445 I am the maintainer of ntpsec in Debian. Debian has 1.1.3. Ubuntu needs the following: - cosmic needs the patches backported. - bionic needs the patches backported. I'm happy to do the work. BTW, these issues may impact the ntp package too, but I'm not sure that anyone (the original report, ntp upstream, or ntp in Debian) has evaluated that.
2019-01-22 23:02:21 Jeremy Bícha information type Public Public Security
2019-01-22 23:02:40 Jeremy Bícha cve linked 2019-6442
2019-01-22 23:02:50 Jeremy Bícha cve linked 2019-6443
2019-01-22 23:03:01 Jeremy Bícha cve linked 2019-6444
2019-01-22 23:03:10 Jeremy Bícha cve linked 2019-6445
2019-01-22 23:06:24 Jeremy Bícha nominated for series Ubuntu Cosmic
2019-01-22 23:06:24 Jeremy Bícha bug task added ntpsec (Ubuntu Cosmic)
2019-01-22 23:06:24 Jeremy Bícha nominated for series Ubuntu Bionic
2019-01-22 23:06:24 Jeremy Bícha bug task added ntpsec (Ubuntu Bionic)
2019-01-22 23:06:32 Jeremy Bícha ntpsec (Ubuntu): status Confirmed Fix Released
2019-01-22 23:06:38 Jeremy Bícha ntpsec (Ubuntu Cosmic): status New Confirmed
2019-01-22 23:06:43 Jeremy Bícha ntpsec (Ubuntu Bionic): status New Confirmed
2019-01-22 23:07:19 Jeremy Bícha bug added subscriber Ubuntu Security Sponsors Team
2019-01-23 04:12:36 Richard Laager attachment added Corrected debdiff for bionic targetting bionic-security https://bugs.launchpad.net/ubuntu/+source/ntpsec/+bug/1812458/+attachment/5231595/+files/bionic-security.debdiff
2019-01-23 04:12:52 Richard Laager attachment added Corrected debdiff for cosmic targetting cosmic-security https://bugs.launchpad.net/ubuntu/+source/ntpsec/+bug/1812458/+attachment/5231596/+files/cosmic-security.debdiff
2019-01-23 20:03:56 Marc Deslauriers ntpsec (Ubuntu Bionic): status Confirmed Fix Committed
2019-01-23 20:03:59 Marc Deslauriers ntpsec (Ubuntu Cosmic): status Confirmed Fix Committed
2019-01-24 13:03:09 Launchpad Janitor ntpsec (Ubuntu Bionic): status Fix Committed Fix Released
2019-01-24 13:13:13 Launchpad Janitor ntpsec (Ubuntu Cosmic): status Fix Committed Fix Released