USN-4563-1: NTP vulnerability
1 October 2020
NTP could be made to crash.
Releases
Packages
- ntp - Network Time Protocol daemon and utility programs
Details
It was discovered that the fix for CVE-2018-7182 introduced a NULL pointer
dereference into NTP. An attacker could use this vulnerability to cause a
denial of service (crash).
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04
-
ntp
-
1:4.2.8p10+dfsg-5ubuntu7.3
-
ntpdate
-
1:4.2.8p10+dfsg-5ubuntu7.3
-
sntp
-
1:4.2.8p10+dfsg-5ubuntu7.3
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-4563-2: ntpdate, ntp, sntp, ntp-doc