CVE-2015-7973

Priority
Description
NTP before 4.2.8p6 and 4.3.x before 4.3.90, when configured in broadcast
mode, allows man-in-the-middle attackers to conduct replay attacks by
sniffing the network.
Notes
mdeslaurunfixed in debian and fedora
Package
Source: ntp (LP Ubuntu Debian)
Upstream:released (4.2.8p5)
Ubuntu 12.04 ESM (Precise Pangolin):released (1:4.2.6.p3+dfsg-1ubuntu3.11)
Ubuntu 14.04 ESM (Trusty Tahr):released (1:4.2.6.p5+dfsg-3ubuntu2.14.04.10)
Ubuntu 16.04 LTS (Xenial Xerus):released (1:4.2.8p4+dfsg-3ubuntu5.3)
Patches:
Upstream:https://github.com/ntp-project/ntp/commit/f6a0225a9fc6ba82268d0d69a8a4eab788889262
Upstream:https://github.com/ntp-project/ntp/commit/c801a6a5f84d7f385a42e0073c94b2e0664f8ad2
Upstream:https://github.com/ntp-project/ntp/commit/50ef2f62dc326bc9edac166b2b4ba5b5d8b4f7d4
More Information

Updated: 2020-07-28 19:55:24 UTC (commit d26b6ca9f5b3adb89bb036ce73ae7dab894935ec)