ntp vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ntp package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Improper Input Validation

*
  • M
Improper Input Validation

*
  • H
Resource Exhaustion

<1:4.2.6.p5+dfsg-7+deb8u3
  • M
Information Exposure

*
  • M
Directory Traversal

<1:4.2.6.p5+dfsg-7+deb8u1
  • C
Out-of-bounds Write

*
  • C
Out-of-bounds Write

*
  • M
CVE-2018-7170

*
  • H
Out-of-bounds Read

*
  • H
CVE-2018-7185

*
  • H
CVE-2018-7184

*
  • M
Improper Input Validation

<1:4.2.6.p5+dfsg-7+deb8u1
  • H
Insufficient Entropy

<1:4.2.6.p5+dfsg-7
  • C
Improper Input Validation

*
  • M
Improper Input Validation

<1:4.2.6.p5+dfsg-7+deb8u1
  • C
Improper Authentication

<1:4.2.6.p5+dfsg-7+deb8u1
  • H
Improper Input Validation

<1:4.2.6.p5+dfsg-7+deb8u1
  • H
Missing Release of Resource after Effective Lifetime

<1:4.2.6.p5+dfsg-7+deb8u1
  • H
Improper Input Validation

<1:4.2.6.p5+dfsg-7+deb8u1
  • H
Improper Input Validation

<1:4.2.6.p5+dfsg-7+deb8u1
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:4.2.6.p5+dfsg-7+deb8u1
  • M
Improper Input Validation

<1:4.2.6.p5+dfsg-7+deb8u1
  • M
Improper Input Validation

<1:4.2.6.p5+dfsg-7+deb8u1
  • H
Improper Input Validation

<1:4.2.6.p5+dfsg-7+deb8u1
  • H
Incorrect Type Conversion or Cast

<1:4.2.6.p5+dfsg-7+deb8u1
  • H
Improper Input Validation

<1:4.2.6.p5+dfsg-7+deb8u1
  • H
Improper Input Validation

<1:4.2.6.p5+dfsg-7+deb8u1
  • H
Time and State

<1:4.2.6.p5+dfsg-7+deb8u1
  • H
Access Restriction Bypass

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • H
Out-of-Bounds

*
  • H
Out-of-Bounds

*
  • H
Resource Exhaustion

<1:4.2.6.p5+dfsg-7+deb8u2
  • M
CVE-2015-8158

<1:4.2.6.p5+dfsg-7+deb8u2
  • M
Out-of-Bounds

*
  • M
Improper Input Validation

<1:4.2.6.p5+dfsg-7+deb8u2
  • M
Improper Access Control

*
  • M
Improper Input Validation

*
  • M
NULL Pointer Dereference

<1:4.2.6.p5+dfsg-7+deb8u2
  • M
Out-of-bounds Read

<1:4.2.6.p5+dfsg-7+deb8u2
  • M
Security Features

*
  • H
Improper Data Handling

<1:4.2.6.p5+dfsg-7+deb8u2
  • M
Security Features

*
  • M
Improper Access Control

*
  • M
Improper Input Validation

<1:4.2.6.p5+dfsg-7+deb8u2
  • M
Resource Exhaustion

*
  • H
Resource Exhaustion

*
  • M
NULL Pointer Dereference

*
  • L
Source Code

*
  • M
Improper Input Validation

<1:4.2.6.p5+dfsg-7+deb8u2
  • M
Improper Data Handling

*
  • M
Information Exposure

<1:4.2.6.p5+dfsg-7+deb8u2
  • H
Improper Data Handling

<1:4.2.6.p5+dfsg-7+deb8u2
  • M
Race Condition

*
  • H
Race Condition

*
  • H
Improper Authentication

<1:4.2.6.p5+dfsg-7+deb8u2
  • M
Improper Input Validation

<1:4.2.6.p5+dfsg-5
  • M
Improper Input Validation

<1:4.2.6.p5+dfsg-4
  • M
Code

<1:4.2.6.p5+dfsg-6
  • L
Code

<1:4.2.6.p5+dfsg-6
  • H
Out-of-Bounds

<1:4.2.6.p5+dfsg-3.2
  • M
Code

<1:4.2.6.p5+dfsg-3.2
  • H
CVE-2014-9293

<1:4.2.6.p5+dfsg-3.2
  • H
CVE-2014-9294

<1:4.2.6.p5+dfsg-3.2
  • M
Improper Input Validation

*
  • M
CVE-2009-3563

<1:4.2.4p8+dfsg-1
  • M
Out-of-Bounds

<1:4.2.4p6+dfsg-2
  • M
Out-of-Bounds

<1:4.2.4p6+dfsg-2
  • M
Improper Authentication

<1:4.2.4p4+dfsg-8
  • M
CVE-2005-2496

<1:4.2.0a+stable-2sarge1
  • M
Integer Overflow or Wraparound

<4.0