ntpd in ntp 4.2.8 before 4.2.8p15 and 4.3.x before 4.3.101 allows remote attackers to cause a denial of service (memory consumption) by sending packets, because memory is not freed in situations where a CMAC key is used and associated with a CMAC algorithm in the ntp.keys file.
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1:4.2.8p12+dfsg-3ubuntu4.20.04.1+esm1", "binary_name": "ntp" }, { "binary_version": "1:4.2.8p12+dfsg-3ubuntu4.20.04.1+esm1", "binary_name": "ntp-dbgsym" }, { "binary_version": "1:4.2.8p12+dfsg-3ubuntu4.20.04.1+esm1", "binary_name": "ntp-doc" }, { "binary_version": "1:4.2.8p12+dfsg-3ubuntu4.20.04.1+esm1", "binary_name": "ntpdate" }, { "binary_version": "1:4.2.8p12+dfsg-3ubuntu4.20.04.1+esm1", "binary_name": "ntpdate-dbgsym" }, { "binary_version": "1:4.2.8p12+dfsg-3ubuntu4.20.04.1+esm1", "binary_name": "sntp" }, { "binary_version": "1:4.2.8p12+dfsg-3ubuntu4.20.04.1+esm1", "binary_name": "sntp-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1:4.2.8p15+dfsg-1ubuntu1", "binary_name": "ntp" }, { "binary_version": "1:4.2.8p15+dfsg-1ubuntu1", "binary_name": "ntp-dbgsym" }, { "binary_version": "1:4.2.8p15+dfsg-1ubuntu1", "binary_name": "ntp-doc" }, { "binary_version": "1:4.2.8p15+dfsg-1ubuntu1", "binary_name": "ntpdate" }, { "binary_version": "1:4.2.8p15+dfsg-1ubuntu1", "binary_name": "ntpdate-dbgsym" }, { "binary_version": "1:4.2.8p15+dfsg-1ubuntu1", "binary_name": "sntp" }, { "binary_version": "1:4.2.8p15+dfsg-1ubuntu1", "binary_name": "sntp-dbgsym" } ] }