The following flaw was found in ntpd: When processing a specially crafted private mode packet, an integer overflow can occur leading to out of bounds memory copy operation. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP daemon, it leads to an immediate crash. External References: http://talosintel.com/reports/TALOS-2015-0052/ http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_Security_Vulner
Statement: This issue did not affect the versions of ntp as shipped with Red Hat Enterprise Linux 5, 6, and 7, as they do not include the affected functionality.
Upstream patch: https://github.com/ntp-project/ntp/commit/c04c3d3d940dfe1a53132925c4f51aef017d2e0f