[USN-4563-2] NTP vulnerability
Avital Ostromich
avital.ostromich at canonical.com
Tue Apr 20 15:14:49 UTC 2021
==========================================================================
Ubuntu Security Notice USN-4563-2
April 20, 2021
ntp vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.10
- Ubuntu 20.04 LTS
Summary:
NTP could be made to crash.
Software Description:
- ntp: Network Time Protocol daemon and utility programs
Details:
USN-4563-1 fixed a vulnerability in NTP. This update provides the
corresponding update for Ubuntu 20.04 LTS and Ubuntu 20.10.
Original advisory details:
It was discovered that the fix for CVE-2018-7182 introduced a NULL pointer
dereference into NTP. An attacker could use this vulnerability to cause a
denial of service (crash).
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.10:
ntp 1:4.2.8p12+dfsg-3ubuntu4.20.10.1
ntpdate 1:4.2.8p12+dfsg-3ubuntu4.20.10.1
sntp 1:4.2.8p12+dfsg-3ubuntu4.20.10.1
Ubuntu 20.04 LTS:
ntp 1:4.2.8p12+dfsg-3ubuntu4.20.04.1
ntpdate 1:4.2.8p12+dfsg-3ubuntu4.20.04.1
sntp 1:4.2.8p12+dfsg-3ubuntu4.20.04.1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-4563-2
https://ubuntu.com/security/notices/USN-4563-1
CVE-2019-8936
Package Information:
https://launchpad.net/ubuntu/+source/ntp/1:4.2.8p12+dfsg-3ubuntu4.20.10.1
https://launchpad.net/ubuntu/+source/ntp/1:4.2.8p12+dfsg-3ubuntu4.20.04.1
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 495 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20210420/2119f3b8/attachment.sig>
More information about the ubuntu-security-announce
mailing list