Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source. Gentoo Security Scout Florian Schuhmacher
upstream reference: http://support.ntp.org/bin/view/Main/NtpBug3505
Note: This problem affects only command line tools and not the server. As these command line tools are usually not run with attacker input A2 is probably overrated.
sparc stable
x86 stable
alpha stable
amd64 stable
ia64 stable
If you want faster stabilization next time please consider fixing testsuite on platforms that don't support -Wl,gc-sections (has a reproducer for amd64): https://bugs.gentoo.org/564018#c11
ppc64 stable
ppc stable
arm stable
hppa stable
arm64 stable
base-system is done here
(In reply to Mikle Kolyada from comment #14) > base-system is done here And yet it's still a base-sysdtem package, so I'd like to keep b-s in CC.
This issue was resolved and addressed in GLSA 201903-15 at https://security.gentoo.org/glsa/201903-15 by GLSA coordinator Aaron Bauman (b-man).