Ubuntu Security Notice 4563-2 - USN-4563-1 fixed a vulnerability in NTP. This update provides the corresponding update for Ubuntu 20.04 LTS and Ubuntu 20.10. It was discovered that the fix for CVE-2018-7182 introduced a NULL pointer dereference into NTP. An attacker could use this vulnerability to cause a denial of service. Various other issues were also addressed.
ef6673d3e576a3567906a1a9483b4e96e99f9e148da6768d28a1344aae2f13f7
Ubuntu Security Notice 4563-1 - It was discovered that the fix for CVE-2018-7182 introduced a NULL pointer dereference into NTP. An attacker could use this vulnerability to cause a denial of service.
d87cf389866a7ac3a59e3adbf8699f85052c8684e103f3158dc16c3897080a52
FreeBSD Security Advisory - A crafted malicious authenticated mode 6 packet from a permitted network address can trigger a NULL pointer dereference. Note for this attack to work, the sending system must be on an address from which the target ntpd(8) accepts mode 6 packets, and must use a private key that is specifically listed as being used for mode 6 authorization. The ntpd daemon can crash due to the NULL pointer dereference, causing a denial of service.
bc4521c84097e29fb5eb67669e8c28944258d7e21f953ff12cfddecc7b64c888
Gentoo Linux Security Advisory 201903-15 - Multiple vulnerabilities have been found in NTP, the worst of which could result in the remote execution of arbitrary code. Versions less than 4.2.8_p13 are affected.
eeba10aa41c8236e0d57e96ec364f7f0bda2a9f0a77b6dde38cd6a4b9fb93411
Slackware Security Advisory - New ntp packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix a security issue.
3551f4f32982f79463f82284794097acbeeed4c56c66201db9e062bf919fbbf8