ntp vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ntp package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Write

*
  • L
Stack-based Buffer Overflow

<0:4.2.6p5-29.el7
  • M
Improper Input Validation

<0:4.2.6p5-28.el7
  • M
Improper Input Validation

<0:4.2.6p5-28.el7
  • M
Improper Input Validation

<0:4.2.6p5-28.el7
  • M
Incorrect Calculation

<0:4.2.6p5-25.el7_3.1
  • M
Resource Exhaustion

<0:4.2.6p5-25.el7_3.1
  • M
NULL Pointer Dereference

<0:4.2.6p5-25.el7_3.1
  • M
Source Code

<0:4.2.6p5-25.el7_3.1
  • M
Resource Exhaustion

<0:4.2.6p5-25.el7_3.1
  • M
External Control of File Name or Path

<0:4.2.6p5-25.el7
  • M
NULL Pointer Dereference

<0:4.2.6p5-25.el7
  • M
Stack-based Buffer Overflow

<0:4.2.6p5-25.el7
  • M
Improper Input Validation

<0:4.2.6p5-25.el7
  • M
Improper Input Validation

<0:4.2.6p5-25.el7
  • M
NULL Pointer Dereference

<0:4.2.6p5-25.el7
  • M
Improper Input Validation

<0:4.2.6p5-25.el7
  • M
Improper Initialization

<0:4.2.6p5-25.el7
  • M
Memory Leak

<0:4.2.6p5-25.el7
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.2.6p5-25.el7
  • M
Off-by-one Error

<0:4.2.6p5-25.el7
  • M
Out-of-bounds Read

<0:4.2.6p5-22.el7_2.2
  • M
Improper Input Validation

<0:4.2.6p5-25.el7
  • M
Improper Input Validation

<0:4.2.6p5-22.el7_2.2
  • M
Improper Data Handling

<0:4.2.6p5-22.el7_2.2
  • M
Information Exposure

<0:4.2.6p5-22.el7_2.2
  • H
Authentication Bypass

<0:4.2.6p5-22.el7_2.1
  • M
Improper Verification of Cryptographic Signature

<0:4.2.6p5-22.el7
  • M
Improper Input Validation

<0:4.2.6p5-22.el7
  • M
Function Call with Incorrectly Specified Arguments

<0:4.2.6p5-22.el7
  • M
CVE-2014-9297

<0:4.2.6p5-22.el7
  • M
Code

<0:4.2.6p5-22.el7
  • M
CVE-2014-9298

<0:4.2.6p5-22.el7
  • M
Improper Input Validation

<0:4.2.6p5-22.el7
  • H
Improper Input Validation

<0:4.2.6p5-19.el7_1.3
  • H
Improper Input Validation

<0:4.2.6p5-19.el7_1.3
  • H
Detection of Error Condition Without Action

<0:4.2.6p5-19.el7_0
  • H
Out-of-Bounds

<0:4.2.6p5-19.el7_0
  • H
PRNG Seed Error

<0:4.2.6p5-19.el7_0
  • H
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

<0:4.2.6p5-19.el7_0
  • M
Improperly Implemented Security Check for Standard

<0:4.2.6p5-29.el7_8.2
  • M
Resource Exhaustion

<0:4.2.6p5-29.el7_8.2
  • L
Session Fixation

*
  • L
CVE-2018-7185

*
  • L
CVE-2018-7170

*
  • M
Race Condition

*
  • L
Race Condition

*
  • L
CVE-2016-4956

*
  • M
Improper Input Validation

*
  • L
Improper Data Handling

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.2.6p5-25.el7
  • M
Missing Critical Step in Authentication

<0:4.2.6p5-25.el7
  • M
External Control of File Name or Path

<0:4.2.6p5-25.el7
  • L
Improper Input Validation

*
  • M
Authentication Bypass

*
  • M
Authentication Bypass

*
  • L
Improper Input Validation

*
  • M
Authentication Bypass

*
  • M
Improper Input Validation

*
  • L
Improper Input Validation

*
  • L
Information Exposure

*