A vulnerability found in the NTP server allows an authenticated remote attacker to crash the daemon by sending an invalid setting via the :config directive. The unpeer option expects a number or an address as an argument. In case the value is "0", a segmentation fault occurs. Affects: All versions of ntp, up to but not including ntp-4.2.8p10, and ntp-4.3.0 up to, but not including ntp-4.3.94. Mitigation: Properly monitor your ntpd instances, and auto-restart ntpd (without -g) if it stops running.
Acknowledgments: Name: the NTP project Upstream: Cure53
Created ntp tracking bugs for this issue: Affects: fedora-all [bug 1435163]
when ntp-4.2.8p 10 will be released with this fix?
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2017:3071 https://access.redhat.com/errata/RHSA-2017:3071
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:0855 https://access.redhat.com/errata/RHSA-2018:0855