This bug was fixed in the package ntp - 1:4.2.8p12+dfsg-3ubuntu4.20.04.1

---------------
ntp (1:4.2.8p12+dfsg-3ubuntu4.20.04.1) focal-security; urgency=medium

  * SECURITY UPDATE: Null dereference attack in mode 6 packet (LP: #1891953)
    - debian/patches/CVE-2019-8936.patch: Guard against operations
      on NULL pointer in ntpd/ntp_control.c.
    - CVE-2019-8936

 -- Brian Morton <rokclim...@gmail.com>  Fri, 27 Nov 2020 16:10:51 -0500

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ntp in Ubuntu.
https://bugs.launchpad.net/bugs/1891953

Title:
  CVE-2019-8936

Status in ntp package in Ubuntu:
  Confirmed
Status in ntp source package in Bionic:
  Fix Released
Status in ntp source package in Focal:
  Fix Released
Status in ntp source package in Groovy:
  Fix Released
Status in ntp package in Debian:
  Fix Released

Bug description:
  It was discovered that the fix for CVE-2018-7182 introduced a NULL pointer
  dereference into NTP. An attacker could use this vulnerability to cause a
  denial of service (crash).

  https://people.canonical.com/~ubuntu-
  security/cve/2019/CVE-2019-8936.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/1891953/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to