[ntp:security] [Bug 3384] NTP-01-009 NTP: Privileged execution of User Library code (Pentest report 01.2017)

bugzilla-daemon at ntp.org bugzilla-daemon at ntp.org
Sun Mar 5 16:03:56 UTC 2017


https://bugs.ntp.org/show_bug.cgi?id=3384

Juergen Perlinger <perlinger at ntp.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
       Hours Worked|                            |7
             Status|IN_PROGRESS                 |READY

--- Comment #2 from Juergen Perlinger <perlinger at ntp.org> 2017-03-05 16:03:56 UTC ---
The repo is in
  psp.ntp.org:~perlinger/ntp-stable-3384

This was bigger cleanup action, as I had to drop use of the 'USE_PPSHACK' env
var, too. The PPS hack will be automatically disabled on a serial line once a
PPS API provider has taken over for that line.

Updating the 'instsrv' program was also a major change. It will write the
loopback-ppsapi-provider as default API provider to the registry and permits
passing other options to the service, too.

Review welcome.

-- 
Configure bugmail: https://bugs.ntp.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.


More information about the security mailing list