[USN-4563-1] NTP vulnerability

Emilia Torino emilia.torino at canonical.com
Thu Oct 1 21:58:23 UTC 2020


==========================================================================
Ubuntu Security Notice USN-4563-1
October 01, 2020

ntp vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS

Summary:

NTP could be made to crash.

Software Description:
- ntp: Network Time Protocol daemon and utility programs

Details:

It was discovered that the fix for CVE-2018-7182 introduced a NULL
pointer dereference into NTP. An attacker could use this vulnerability
to cause a denial of service (crash).

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
  ntp                             1:4.2.8p10+dfsg-5ubuntu7.3
  ntpdate                         1:4.2.8p10+dfsg-5ubuntu7.3
  sntp                            1:4.2.8p10+dfsg-5ubuntu7.3

In general, a standard system update will make all the necessary changes.

References:
  https://usn.ubuntu.com/4563-1
  CVE-2019-8936

Package Information:
  https://launchpad.net/ubuntu/+source/ntp/1:4.2.8p10+dfsg-5ubuntu7.3

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20201001/58f35eb1/attachment.sig>


More information about the ubuntu-security-announce mailing list