CVE-2018-7182

NameCVE-2018-7182
DescriptionThe ctl_getitem method in ntpd in ntp-4.2.8p6 before 4.2.8p11 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mode 6 packet with a ntpd instance from 4.2.8p6 through 4.2.8p10.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ntp (PTS)buster1:4.2.8p12+dfsg-4fixed
bullseye1:4.2.8p15+dfsg-1fixed
ntpsec (PTS)buster1.1.3+dfsg1-2+deb10u1fixed
bullseye1.2.0+dfsg1-4fixed
bookworm, bookworm (security)1.2.2+dfsg1-1+deb12u1fixed
trixie1.2.2+dfsg1-4fixed
sid1.2.3+dfsg1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ntpsourcewheezy(not affected)
ntpsource(unstable)1:4.2.8p11+dfsg-1
ntpsecsource(unstable)1.0.0+dfsg1-5

Notes

[stretch] - ntp <postponed> (Can be fixed along in a future update)
[jessie] - ntp <postponed> (Can be fixed along in a future update)
[wheezy] - ntp <not-affected> (Issue not present)
http://www.kb.cert.org/vuls/id/961909
http://support.ntp.org/bin/view/Main/NtpBug3412
http://support.ntp.org/bin/view/Main/SecurityNotice#February_2018_ntp_4_2_8p11_NTP_S
Fixed by (ntpsec): https://gitlab.com/NTPsec/ntpsec/commit/6d6aa6da0fe685011f5a9633c3618409af8349d7
https://lists.ntpsec.org/pipermail/devel/2018-March/006008.html

Search for package or bug name: Reporting problems