Bug 2229288 (CVE-2023-4012) - CVE-2023-4012 ntpsec: crash after client request
Summary: CVE-2023-4012 ntpsec: crash after client request
Keywords:
Status: CLOSED UPSTREAM
Alias: CVE-2023-4012
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2229289
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-08-04 18:59 UTC by Patrick Del Bello
Modified: 2023-08-04 23:39 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2023-08-04 23:39:18 UTC
Embargoed:


Attachments (Terms of Use)

Description Patrick Del Bello 2023-08-04 18:59:17 UTC
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5466-1                   security
https://www.debian.org/security/                     Salvatore Bonaccorso
August 04, 2023                       https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : ntpsec
CVE ID         : CVE-2023-4012
Debian Bug     : 1038422

It was discovered that ntpd in ntpsec, a secure, hardened, and improved
implementation derived from the original NTP project, could crash if NTS
is disabled and an NTS-enabled client request (mode 3) is received.

For the stable distribution (bookworm), this problem has been fixed in
version 1.2.2+dfsg1-1+deb12u1.

We recommend that you upgrade your ntpsec packages.

For the detailed security status of ntpsec please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/ntpsec

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce.org
-----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmTMiPdfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0QCoRAAiCGW5caem2KkAZjuk/GUZ6Gd1/FIiyU5rYJQ403XJs3rfB4plt1FiEjM
dNy3TpoUXmngXKhuJTmEEtRvCjkP1mw6CytsWqhPAJSPuHznLYsdbm9wUBA3vVec
2efb31KXaye3L764GgardYuKSei2i+FtToejls72qFjAxXSPreYaSbTXHUMpTqI3
1vMpG8fDhijJP3Ax1JSsGOwHxnudg9/WPGrkVnRlJ0VTWxDJchVGGOvUaXyy13qu
ZYI3YK8cBWQVTu7SSVNiEpZ1LxoBTw84mNoDoVCpoW72oNiZGYoA4Ff45JoSQz0m
j73Vqd6j2+E8xZdwri/f483XTd+KVbimomSZZ5ks8eE9+X35LZxA7vfdEuhrD0Qh
VuDO3z7TTqRMhW5aAWjNs27uH6tynxNvw4ShEi0iegLkZH930Q7dHe6CptJvQcem
lzdE0teNRlg7+/W+h64QyY7wrqBou+Hkv+lP+gABUfzjS10YwY5ZrzwBdPTvFS7/
/esIhIf72Mg1FTNJvC2s6TirOnxu90b6JjabAcObBkXDmL/KlEid7Rl67sTvaLV/
V+9c6Jy9NXlvyoXvBJJ7cOTkKYok1LowIwvtzEiwFBiZCeA+B4g8rgePL7ZiPOAz
Uuq7kwDMj5hU+jYfVs2iAcavWpXBIOgryKibn2wNkQW+NxjSMA4=
=L3OU
-----END PGP SIGNATURE-----

Comment 1 Patrick Del Bello 2023-08-04 18:59:39 UTC
Created ntpsec tracking bugs for this issue:

Affects: fedora-all [bug 2229289]

Comment 2 Product Security DevOps Team 2023-08-04 23:39:17 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.


Note You need to log in before you can comment on or make changes to this bug.