USN-4563-2: NTP vulnerability
20 April 2021
NTP could be made to crash.
Releases
Packages
- ntp - Network Time Protocol daemon and utility programs
Details
USN-4563-1 fixed a vulnerability in NTP. This update provides the
corresponding update for Ubuntu 20.04 LTS and Ubuntu 20.10.
Original advisory details:
It was discovered that the fix for CVE-2018-7182 introduced a NULL pointer
dereference into NTP. An attacker could use this vulnerability to cause a
denial of service (crash).
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.10
-
ntp
-
1:4.2.8p12+dfsg-3ubuntu4.20.10.1
-
ntpdate
-
1:4.2.8p12+dfsg-3ubuntu4.20.10.1
-
sntp
-
1:4.2.8p12+dfsg-3ubuntu4.20.10.1
Ubuntu 20.04
-
ntp
-
1:4.2.8p12+dfsg-3ubuntu4.20.04.1
-
ntpdate
-
1:4.2.8p12+dfsg-3ubuntu4.20.04.1
-
sntp
-
1:4.2.8p12+dfsg-3ubuntu4.20.04.1
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-4563-1: sntp, ntp, ntpdate, ntp-doc