There is a potential for a buffer overflow in the legacy Datum Programmable Time Server refclock driver. Here the packets are processed from the /dev/datum device and handled in datum_pts_receive(). Since an attacker would be required to somehow control a malicious /dev/datum device, this does not appear to be a practical attack and renders this issue "Low" in terms of severity. Affects: All versions of NTP, up to but not including ntp-4.2.8p10, and ntp-4.3.0 up to, but not including ntp-4.3.94. Mitigation: Properly monitor your ntpd instances, and auto-restart ntpd (without -g) if it stops running.
Acknowledgments: Name: the NTP project Upstream: Cure53
Created ntp tracking bugs for this issue: Affects: fedora-all [bug 1435163]
do we have a reproducer for this?
(In reply to Karel Volný from comment #6) > do we have a reproducer for this? We do not have a reproducer for this flaw, nor can I easily find one online, sorry.
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2017:3071 https://access.redhat.com/errata/RHSA-2017:3071
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:0855 https://access.redhat.com/errata/RHSA-2018:0855