First published: Tue Apr 20 2021(Updated: )
USN-4563-1 fixed a vulnerability in NTP. This update provides the corresponding update for Ubuntu 20.04 LTS and Ubuntu 20.10. Original advisory details: It was discovered that the fix for CVE-2018-7182 introduced a NULL pointer dereference into NTP. An attacker could use this vulnerability to cause a denial of service (crash).
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/ntp | <1:4.2.8p12+dfsg-3ubuntu4.20.10.1 | 1:4.2.8p12+dfsg-3ubuntu4.20.10.1 |
Ubuntu Ubuntu | =20.10 | |
All of | ||
ubuntu/ntpdate | <1:4.2.8p12+dfsg-3ubuntu4.20.10.1 | 1:4.2.8p12+dfsg-3ubuntu4.20.10.1 |
Ubuntu Ubuntu | =20.10 | |
All of | ||
ubuntu/sntp | <1:4.2.8p12+dfsg-3ubuntu4.20.10.1 | 1:4.2.8p12+dfsg-3ubuntu4.20.10.1 |
Ubuntu Ubuntu | =20.10 | |
All of | ||
ubuntu/ntp | <1:4.2.8p12+dfsg-3ubuntu4.20.04.1 | 1:4.2.8p12+dfsg-3ubuntu4.20.04.1 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/ntpdate | <1:4.2.8p12+dfsg-3ubuntu4.20.04.1 | 1:4.2.8p12+dfsg-3ubuntu4.20.04.1 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/sntp | <1:4.2.8p12+dfsg-3ubuntu4.20.04.1 | 1:4.2.8p12+dfsg-3ubuntu4.20.04.1 |
Ubuntu Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is USN-4563-2.
The severity of USN-4563-2 is not specified.
The affected software includes NTP, ntpdate, and sntp.
The Ubuntu versions affected are 20.04 and 20.10.
To fix the vulnerability, update the affected software packages to at least version 1:4.2.8p12+dfsg-3ubuntu4.20.04.1 for Ubuntu 20.04 and version 1:4.2.8p12+dfsg-3ubuntu4.20.10.1 for Ubuntu 20.10.