DSA-5466-1 ntpsec -- security update

Related Vulnerabilities: CVE-2023-4012  

It was discovered that ntpd in ntpsec, a secure, hardened, and improved implementation derived from the original NTP project, could crash if NTS is disabled and an NTS-enabled client request (mode 3) is received. For the stable distribution (bookworm), this problem has been fixed in version 1.2.2+dfsg1-1+deb12u1. We recommend that you upgrade your ntpsec packages. For the detailed security status of ntpsec please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ntpsec

Debian Security Advisory

DSA-5466-1 ntpsec -- security update

Date Reported:
04 Aug 2023
Affected Packages:
ntpsec
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 1038422.
In Mitre's CVE dictionary: CVE-2023-4012.
More information:

It was discovered that ntpd in ntpsec, a secure, hardened, and improved implementation derived from the original NTP project, could crash if NTS is disabled and an NTS-enabled client request (mode 3) is received.

For the stable distribution (bookworm), this problem has been fixed in version 1.2.2+dfsg1-1+deb12u1.

We recommend that you upgrade your ntpsec packages.

For the detailed security status of ntpsec please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ntpsec