Description
NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause
a denial of service (client-server association tear down) by sending
broadcast packets with invalid authentication to a broadcast client.
Notes
mdeslaur | fedora has an alternate fix
http://lists.ntp.org/pipermail/hackers/2016-January/007416.html |
Package
Upstream: | released
(4.2.8p6)
|
Ubuntu 16.04 ESM: | released
(1:4.2.8p4+dfsg-3ubuntu5.3)
|
Ubuntu 14.04 ESM: | released
(1:4.2.6.p5+dfsg-3ubuntu2.14.04.10)
|
Ubuntu 20.04 FIPS Compliant: | not-affected
(1:4.2.8p4+dfsg-3ubuntu6)
|
Patches:
Updated: 2022-04-13 12:06:49 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)