UBUNTU-CVE-2021-22212

Source
https://ubuntu.com/security/CVE-2021-22212
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-22212.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2021-22212
Related
Published
2021-06-08T13:15:00Z
Modified
2024-10-15T14:08:01Z
Severity
  • 7.4 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

ntpkeygen can generate keys that ntpd fails to parse. NTPsec 1.2.0 allows ntpkeygen to generate keys with '#' characters. ntpd then either pads, shortens the key, or fails to load these keys entirely, depending on the key type and the placement of the '#'. This results in the administrator not being able to use the keys as expected or the keys are shorter than expected and easier to brute-force, possibly resulting in MITM attacks between ntp clients and ntp servers. For short AES128 keys, ntpd generates a warning that it is padding them.

References

Affected packages

Ubuntu:Pro:18.04:LTS / ntpsec

Package

Name
ntpsec
Purl
pkg:deb/ubuntu/ntpsec?arch=src?distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.0.0+dfsg1-1
1.0.0+dfsg1-3
1.1.0+dfsg1-1
1.1.0+dfsg1-1ubuntu0.1
1.1.0+dfsg1-1ubuntu0.2

Ecosystem specific

{
    "ubuntu_priority": "low"
}

Ubuntu:20.04:LTS / ntpsec

Package

Name
ntpsec
Purl
pkg:deb/ubuntu/ntpsec?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.1.3+dfsg1-2
1.1.7+dfsg1-1
1.1.7+dfsg1-2
1.1.8+dfsg1-1
1.1.8+dfsg1-3
1.1.8+dfsg1-4
1.1.8+dfsg1-4build1

Ecosystem specific

{
    "ubuntu_priority": "low"
}

Ubuntu:22.04:LTS / ntpsec

Package

Name
ntpsec
Purl
pkg:deb/ubuntu/ntpsec?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.2.0+dfsg1-4
1.2.1+dfsg1-2
1.2.1+dfsg1-3
1.2.1+dfsg1-3ubuntu1
1.2.1+dfsg1-4

Ecosystem specific

{
    "ubuntu_priority": "low"
}

Ubuntu:24.10 / ntpsec

Package

Name
ntpsec
Purl
pkg:deb/ubuntu/ntpsec?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.2.2+dfsg1-4build2
1.2.3+dfsg1-2
1.2.3+dfsg1-3

Ecosystem specific

{
    "ubuntu_priority": "low"
}

Ubuntu:24.04:LTS / ntpsec

Package

Name
ntpsec
Purl
pkg:deb/ubuntu/ntpsec?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.2.2+dfsg1-2
1.2.2+dfsg1-3
1.2.2+dfsg1-4
1.2.2+dfsg1-4build1
1.2.2+dfsg1-4build2

Ecosystem specific

{
    "ubuntu_priority": "low"
}