ntp vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the ntp package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2018-7170

*
  • L
Improper Input Validation

<1:4.2.6.p3+dfsg-1ubuntu3.6
  • M
Insufficient Entropy

<1:4.2.6.p3+dfsg-1ubuntu3.4
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<1:4.2.6.p3+dfsg-1ubuntu3.6
  • M
Improper Input Validation

<1:4.2.6.p3+dfsg-1ubuntu3.6
  • M
Improper Input Validation

<1:4.2.6.p3+dfsg-1ubuntu3.6
  • M
Improper Input Validation

<1:4.2.6.p3+dfsg-1ubuntu3.6
  • M
Improper Input Validation

<1:4.2.6.p3+dfsg-1ubuntu3.6
  • M
Improper Input Validation

<1:4.2.6.p3+dfsg-1ubuntu3.6
  • M
Improper Input Validation

<1:4.2.6.p3+dfsg-1ubuntu3.6
  • M
Buffer Overflow

<1:4.2.6.p3+dfsg-1ubuntu3.6
  • M
Missing Release of Resource after Effective Lifetime

<1:4.2.6.p3+dfsg-1ubuntu3.6
  • M
Improper Authentication

<1:4.2.6.p3+dfsg-1ubuntu3.6
  • M
Improper Input Validation

<1:4.2.6.p3+dfsg-1ubuntu3.6
  • M
Improper Input Validation

<1:4.2.6.p3+dfsg-1ubuntu3.6
  • L
Incorrect Type Conversion or Cast

<1:4.2.6.p3+dfsg-1ubuntu3.6
  • L
Improper Input Validation

<1:4.2.6.p3+dfsg-1ubuntu3.6
  • L
Improper Input Validation

<1:4.2.6.p3+dfsg-1ubuntu3.6
  • M
Time and State

<1:4.2.6.p3+dfsg-1ubuntu3.6
  • L
Access Restriction Bypass

<1:4.2.6.p3+dfsg-1ubuntu3.11
  • L
Improper Input Validation

*
  • L
Improper Input Validation

<1:4.2.6.p3+dfsg-1ubuntu3.12
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

<1:4.2.6.p3+dfsg-1ubuntu3.12
  • L
Out-of-bounds Read

<1:4.2.6.p3+dfsg-1ubuntu3.11
  • M
Improper Input Validation

<1:4.2.6.p3+dfsg-1ubuntu3.11
  • M
Resource Exhaustion

<1:4.2.6.p3+dfsg-1ubuntu3.11
  • M
Improper Input Validation

<1:4.2.6.p3+dfsg-1ubuntu3.11
  • L
Improper Data Handling

<1:4.2.6.p3+dfsg-1ubuntu3.11
  • L
Security Features

<1:4.2.6.p3+dfsg-1ubuntu3.11
  • M
NULL Pointer Dereference

<1:4.2.6.p3+dfsg-1ubuntu3.11
  • L
CVE-2015-8158

<1:4.2.6.p3+dfsg-1ubuntu3.11
  • L
Security Features

<1:4.2.6.p3+dfsg-1ubuntu3.11
  • L
Resource Exhaustion

<1:4.2.6.p3+dfsg-1ubuntu3.12
  • L
Resource Exhaustion

<1:4.2.6.p3+dfsg-1ubuntu3.12
  • L
Resource Exhaustion

<1:4.2.6.p3+dfsg-1ubuntu3.12
  • L
Resource Exhaustion

<1:4.2.6.p3+dfsg-1ubuntu3.12
  • L
NULL Pointer Dereference

<1:4.2.6.p3+dfsg-1ubuntu3.12
  • M
Improper Data Handling

<1:4.2.6.p3+dfsg-1ubuntu3.11
  • M
Improper Input Validation

<1:4.2.6.p3+dfsg-1ubuntu3.11
  • M
Information Exposure

<1:4.2.6.p3+dfsg-1ubuntu3.11
  • L
CVE-2016-4956

<1:4.2.6.p3+dfsg-1ubuntu3.11
  • L
Race Condition

<1:4.2.6.p3+dfsg-1ubuntu3.11
  • L
Race Condition

<1:4.2.6.p3+dfsg-1ubuntu3.11
  • L
Improper Authentication

<1:4.2.6.p3+dfsg-1ubuntu3.11
  • L
CVE-2015-5196

<1:4.2.6.p3+dfsg-1ubuntu3.6
  • M
CVE-2014-9298

<1:4.2.6.p3+dfsg-1ubuntu3.3
  • M
CVE-2014-9297

<1:4.2.6.p3+dfsg-1ubuntu3.3
  • M
Code

<1:4.2.6.p3+dfsg-1ubuntu3.4
  • M
Code

<1:4.2.6.p3+dfsg-1ubuntu3.4
  • M
Code

<1:4.2.6.p3+dfsg-1ubuntu3.2
  • M
CVE-2014-9294

<1:4.2.6.p3+dfsg-1ubuntu3.2
  • M
CVE-2014-9293

<1:4.2.6.p3+dfsg-1ubuntu3.2
  • L
Out-of-Bounds

<1:4.2.6.p3+dfsg-1ubuntu3.2