OESA-2022-1953

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2022-1953
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2022-1953.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2022-1953
Upstream
Published
2022-09-23T11:04:20Z
Modified
2025-09-03T06:17:00.001094Z
Summary
ntp security update
Details

NTP is a protocol designed to synchronize the clocks of computers over a network, NTP version 4, a significant revision of the previous NTP standard, is the current development version. It is formalized by RFCs released by the IETF.

Security Fix(es):

ntpd in ntp 4.2.8 before 4.2.8p15 and 4.3.x before 4.3.101 allows remote attackers to cause a denial of service (memory consumption) by sending packets, because memory is not freed in situations where a CMAC key is used and associated with a CMAC algorithm in the ntp.keys file.(CVE-2020-15025)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:20.03-LTS-SP3 / ntp

Package

Name
ntp
Purl
pkg:rpm/openEuler/ntp&distro=openEuler-20.03-LTS-SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.2.8p14-6.oe1

Ecosystem specific

{
    "noarch": [
        "ntp-help-4.2.8p14-6.oe1.noarch.rpm",
        "ntp-perl-4.2.8p14-6.oe1.noarch.rpm"
    ],
    "src": [
        "ntp-4.2.8p14-6.oe1.src.rpm"
    ],
    "x86_64": [
        "ntp-debugsource-4.2.8p14-6.oe1.x86_64.rpm",
        "ntp-4.2.8p14-6.oe1.x86_64.rpm",
        "ntp-debuginfo-4.2.8p14-6.oe1.x86_64.rpm"
    ],
    "aarch64": [
        "ntp-debugsource-4.2.8p14-6.oe1.aarch64.rpm",
        "ntp-debuginfo-4.2.8p14-6.oe1.aarch64.rpm",
        "ntp-4.2.8p14-6.oe1.aarch64.rpm"
    ]
}