diff -Nru ntp-4.2.6.p5+dfsg/debian/changelog ntp-4.2.6.p5+dfsg/debian/changelog --- ntp-4.2.6.p5+dfsg/debian/changelog 2015-10-23 11:05:12.000000000 -0400 +++ ntp-4.2.6.p5+dfsg/debian/changelog 2016-01-25 12:05:48.000000000 -0500 @@ -1,3 +1,10 @@ +ntp (1:4.2.6.p5+dfsg-3ubuntu8.2) wily; urgency=medium + + * ntpd rejects source UDP ports less than 123 as bogus (closes: #691412) + - d/p/reject-UDP-ports-less-than-123-as-bogus.patch (LP: #1479652) + + -- Eric Desrochers Mon, 25 Jan 2016 12:05:25 -0500 + ntp (1:4.2.6.p5+dfsg-3ubuntu8.1) wily-security; urgency=medium * SECURITY UPDATE: denial of service via crafted NUL-byte in diff -Nru ntp-4.2.6.p5+dfsg/debian/patches/reject-UDP-ports-less-than-123-as-bogus.patch ntp-4.2.6.p5+dfsg/debian/patches/reject-UDP-ports-less-than-123-as-bogus.patch --- ntp-4.2.6.p5+dfsg/debian/patches/reject-UDP-ports-less-than-123-as-bogus.patch 1969-12-31 19:00:00.000000000 -0500 +++ ntp-4.2.6.p5+dfsg/debian/patches/reject-UDP-ports-less-than-123-as-bogus.patch 2016-01-25 12:02:45.000000000 -0500 @@ -0,0 +1,31 @@ +Description: [Bug 2174] ntpd rejects source UDP ports less than 123 as bogus. + +If an NTP client sends a request with a source port less than 123, the packet +is silently ignored by ntpd. This is occurring in our environment due to NAT. + +Author: davehart@dlh-7551.ad.hartbrothers.com +Bug: http://bugs.ntp.org/show_bug.cgi?id=2174 +--- a/ntpd/ntp_proto.c ++++ b/ntpd/ntp_proto.c +@@ -334,18 +334,15 @@ + * reveals a clogging attack. + */ + sys_received++; +- if (SRCPORT(&rbufp->recv_srcadr) < NTP_PORT) { ++ if (0 == SRCPORT(&rbufp->recv_srcadr)) { + sys_badlength++; + return; /* bogus port */ + } + restrict_mask = restrictions(&rbufp->recv_srcadr); +-#ifdef DEBUG +- if (debug > 1) +- printf("receive: at %ld %s<-%s flags %x restrict %03x\n", ++ DPRINTF(2, ("receive: at %ld %s<-%s flags %x restrict %03x\n", + current_time, stoa(&rbufp->dstadr->sin), + stoa(&rbufp->recv_srcadr), +- rbufp->dstadr->flags, restrict_mask); +-#endif ++ rbufp->dstadr->flags, restrict_mask)); + pkt = &rbufp->recv_pkt; + hisversion = PKT_VERSION(pkt->li_vn_mode); + hisleap = PKT_LEAP(pkt->li_vn_mode); diff -Nru ntp-4.2.6.p5+dfsg/debian/patches/series ntp-4.2.6.p5+dfsg/debian/patches/series --- ntp-4.2.6.p5+dfsg/debian/patches/series 2015-10-23 11:04:38.000000000 -0400 +++ ntp-4.2.6.p5+dfsg/debian/patches/series 2016-01-25 11:58:33.000000000 -0500 @@ -35,3 +35,4 @@ CVE-2015-7853.patch CVE-2015-7855.patch CVE-2015-7871.patch +reject-UDP-ports-less-than-123-as-bogus.patch