From ${URL} : A flaw was found in ntp before version 4.2.8p13. An authenticated attacker can cause ntpd to sigsegv by triggering a NULL pointer exception. Upstream issue: http://bugs.ntp.org/show_bug.cgi?id=3565 Upstream patch: http://bk.ntp.org/ntp-stable/ntpd/ntp_control.c?PAGE=diffs&REV=5c8106e7wWtXdh0lzg1ytlWribBTcQ References: https://gitlab.com/NTPsec/ntpsec/issues/509 @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
amd64 stable
sparc stable
s390 stable
x86 stable
arm64 stable
arm stable
hppa stable
ppc stable
ppc64 stable
ia64 stable
sh stable
m68k stable
alpha stable
This issue was resolved and addressed in GLSA 201903-15 at https://security.gentoo.org/glsa/201903-15 by GLSA coordinator Aaron Bauman (b-man).