Fixed                
                
            
            
                
                    Created: Feb 27, 2018   
                                            Updated: Dec 3, 2018                                    
                
                    
                                    
             
         
        
            
            
                                    
                        Resolved Date: Jun 7, 2018                    
                
                
                                    
                        Found In Version: 6.0.0.36                     
                
                                    
                        Fix Version: 6.0.0.37                    
                
                                        
                            Severity: Standard                        
                    
                                        
                            Applicable for: Wind River Linux 6                        
                    
                                    
                        Component/s: Userspace                    
                
                
                             
         
                        
                The fix for NtpBug2952 was incomplete, and while it fixed one problem it created another. Specifically, it drops bad packets before updating the "received" timestamp. This means a third-party can inject a packet with a zero-origin timestamp, meaning the sender wants to reset the association, and the transmit timestamp in this bogus packet will be saved as the most recent "received" timestamp. The real remote peer does not know this value and this will disrupt the association until the association resets.
https://nvd.nist.gov/vuln/detail/CVE-2018-7184