CVE-2014-9296

Publication date 19 December 2014

Last updated 24 July 2024


Ubuntu priority

The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended association change via crafted packets.

Status

Package Ubuntu Release Status
ntp 14.10 utopic
Fixed 1:4.2.6.p5+dfsg-3ubuntu2.14.10.1
14.04 LTS trusty
Fixed 1:4.2.6.p5+dfsg-3ubuntu2.14.04.1
12.04 LTS precise
Fixed 1:4.2.6.p3+dfsg-1ubuntu3.2
10.04 LTS lucid
Not affected

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
ntp