Description
An off-path attacker can cause a preemptible client association to be
demobilized in NTP 4.2.8p4 and earlier and NTPSec
a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to
a victim client with a spoofed source address of an existing associated
peer. This is true even if authentication is enabled.
Notes
| mdeslaur | fedora patch for CVE-2015-7979 also covers this CVE |
Package
| Upstream: | released
(1:4.2.8p7+dfsg-1)
|
| Ubuntu 16.04 ESM: | released
(1:4.2.8p4+dfsg-3ubuntu5.3)
|
| Ubuntu 14.04 ESM: | released
(1:4.2.6.p5+dfsg-3ubuntu2.14.04.10)
|
| Ubuntu 20.04 FIPS Compliant: | not-affected
(1:4.2.8p4+dfsg-3ubuntu6)
|
Patches:
Updated: 2022-04-13 12:11:41 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)