Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11
allows an attacker to achieve code execution or escalate to higher
privileges via a long string as the argument for an IPv4 or IPv6
command-line parameter. NOTE: It is unclear whether there are any common
situations in which ntpq or ntpdc is used with a command line from an
untrusted source.
Source: ntp (LP Ubuntu Debian)
Upstream:released (4.2.8p12)
Ubuntu 12.04 ESM (Precise Pangolin):released (1:4.2.6.p3+dfsg-1ubuntu3.13)
Ubuntu 14.04 ESM (Trusty Tahr):released (1:4.2.6.p5+dfsg-3ubuntu2.14.04.13+esm1)
Ubuntu 16.04 LTS (Xenial Xerus):released (1:4.2.8p4+dfsg-3ubuntu5.10)
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 19.04 (Disco Dingo):not-affected (1:4.2.8p12+dfsg-3ubuntu1)
Ubuntu 19.10 (Eoan Ermine):not-affected (1:4.2.8p12+dfsg-3ubuntu2)
Ubuntu 20.04 (Focal Fossa):not-affected (1:4.2.8p12+dfsg-3ubuntu3)
More Information

Updated: 2020-01-11 00:14:14 UTC (commit 5ec2e1c4ad61522c91703af34b5efc5215f88d0e)