Description
The process_packet function in ntp_proto.c in ntpd in NTP 4.x before
4.2.8p8 allows remote attackers to cause a denial of service (peer-variable
modification) by sending spoofed packets from many source IP addresses in a
certain scenario, as demonstrated by triggering an incorrect leap
indication.
Package
| Upstream: | needs-triage
|
| Ubuntu 16.04 ESM: | released
(1:4.2.8p4+dfsg-3ubuntu5.3)
|
| Ubuntu 14.04 ESM: | released
(1:4.2.6.p5+dfsg-3ubuntu2.14.04.10)
|
| Ubuntu 20.04 FIPS Compliant: | not-affected
(1:4.2.8p8+dfsg-1ubuntu2)
|
Patches:
Updated: 2022-04-13 12:22:39 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)