Multiple buffer overflow vulnerabilities in NTP before 4.2.8 have been revealed.
Airlock is not affected because the NTP configuration is safe. Additionally the NTP access is restricted to the internal/management interface of Airlock and can not be exploited by external parties.
No action required for Airlock.