The following flaw was found in ntpd: A potential buffer overflow vulnerability exists in the refclock of ntpd. An invalid length provided by a hardware reference clock could cause a buffer overflow potentially resulting in memory being modified. A malicious reflock could provide a negative length to trigger this vulnerability. External References: http://talosintel.com/reports/TALOS-2015-0064/ http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_Security_Vulner
Upstream patch: https://github.com/ntp-project/ntp/commit/8482b536f9494a5d45196ab5b7e13040f5940261
Created ntp tracking bugs for this issue: Affects: fedora-all [bug 1296163]
Statement: This issue did not affect the versions of ntp as shipped with Red Hat Enterprise Linux 5, 6, and 7 as they do not include the custom refclock driver.