sntp vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the sntp package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Origin Validation Error

<0:4.2.6p5-29.0.1.el7_8.2
  • M
Use of Insufficiently Random Values

<0:4.2.6p5-29.0.1.el7_8.2
  • L
Out-of-bounds Write

<0:4.2.6p5-29.0.1.el7
  • M
Improper Input Validation

<0:4.2.6p5-28.0.1.el7
  • M
Out-of-Bounds

<0:4.2.6p5-28.0.1.el7
  • M
Improper Input Validation

<0:4.2.6p5-28.0.1.el7
  • M
Source Code

<0:4.2.6p5-25.0.1.el7_3.1
  • M
Incorrect Calculation

<0:4.2.6p5-25.0.1.el7_3.1
  • M
Resource Exhaustion

<0:4.2.6p5-25.0.1.el7_3.1
  • M
NULL Pointer Dereference

<0:4.2.6p5-25.0.1.el7_3.1
  • M
Resource Exhaustion

<0:4.2.6p5-25.0.1.el7_3.1
  • H
Improper Input Validation

<0:4.2.6p5-22.0.1.el7_2.2
  • M
CVE-2015-5196

<0:4.2.6p5-25.0.1.el7
  • M
Improper Authentication

<0:4.2.6p5-25.0.1.el7
  • M
CVE-2015-8158

<0:4.2.6p5-25.0.1.el7
  • M
NULL Pointer Dereference

<0:4.2.6p5-25.0.1.el7
  • M
Resource Exhaustion

<0:4.2.6p5-25.0.1.el7
  • M
Improper Data Handling

<0:4.2.6p5-22.el7_2.2
  • M
Improper Input Validation

<0:4.2.6p5-25.0.1.el7
  • M
Information Exposure

<0:4.2.6p5-22.el7_2.2
  • M
Out-of-bounds Read

<0:4.2.6p5-22.el7_2.2
  • M
Improper Input Validation

<0:4.2.6p5-25.0.1.el7
  • M
Improper Input Validation

<0:4.2.6p5-25.0.1.el7
  • M
Improper Data Handling

<0:4.2.6p5-25.0.1.el7
  • M
Improper Input Validation

<0:4.2.6p5-25.0.1.el7
  • M
Improper Input Validation

<0:4.2.6p5-22.el7_2.2
  • M
Improper Input Validation

<0:4.2.6p5-25.0.1.el7
  • M
Improper Input Validation

<0:4.2.6p5-25.0.1.el7
  • M
Incorrect Type Conversion or Cast

<0:4.2.6p5-25.0.1.el7
  • M
Improper Input Validation

<0:4.2.6p5-25.0.1.el7
  • M
Missing Release of Resource after Effective Lifetime

<0:4.2.6p5-25.0.1.el7
  • H
Improper Input Validation

<0:4.2.6p5-22.el7_2.1
  • M
Improper Input Validation

<0:4.2.6p5-22.el7
  • M
Improper Input Validation

<0:4.2.6p5-22.el7
  • H
Time and State

<0:4.2.6p5-19.el7_1.3
  • H
Improper Input Validation

<0:4.2.6p5-19.el7_1.3
  • M
Insufficient Entropy

<0:4.2.6p5-22.el7
  • M
CVE-2014-9298

<0:4.2.6p5-22.el7
  • M
Code

<0:4.2.6p5-22.el7
  • M
Code

<0:4.2.6p5-22.el7
  • M
CVE-2014-9297

<0:4.2.6p5-22.el7
  • H
CVE-2014-9294

<0:4.2.6p5-19.el7_0
  • H
Code

<0:4.2.6p5-19.el7_0
  • H
CVE-2014-9293

<0:4.2.6p5-19.el7_0
  • H
Out-of-Bounds

<0:4.2.6p5-19.el7_0