Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source.
Gentoo Security Scout
upstream reference: http://support.ntp.org/bin/view/Main/NtpBug3505
Note: This problem affects only command line tools and not the server. As these command line tools are usually not run with attacker input A2 is probably overrated.
If you want faster stabilization next time please consider fixing testsuite on platforms that don't support -Wl,gc-sections (has a reproducer for amd64):
base-system is done here
(In reply to Mikle Kolyada from comment #14)
> base-system is done here
And yet it's still a base-sysdtem package, so I'd like to keep b-s in CC.
This issue was resolved and addressed in
GLSA 201903-15 at https://security.gentoo.org/glsa/201903-15
by GLSA coordinator Aaron Bauman (b-man).