Search CVE reports


Toggle filters

1 – 10 of 112 results


CVE-2026-26076

Medium priority
Needs evaluation

ntpd-rs is a full-featured implementation of the Network Time Protocol. Prior to 1.7.1, an attacker can remotely induce moderate increases (2-4 times above normal) in cpu usage. When having NTS enabled on an ntpd-rs server, an...

1 affected package

rust-ntpd

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
rust-ntpd Needs evaluation Not in release
Show less packages

CVE-2025-58066

Medium priority
Needs evaluation

nptd-rs is a tool for synchronizing your computer's clock, implementing the NTP and NTS protocols. In versions between 1.2.0 and 1.6.1 inclusive servers which allow non-NTS traffic are affected by a denial of...

1 affected package

rust-ntpd

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
rust-ntpd Needs evaluation Not in release
Show less packages

CVE-2024-38528

Medium priority
Needs evaluation

nptd-rs is a tool for synchronizing your computer's clock, implementing the NTP and NTS protocols. There is a missing limit for accepted NTS-KE connections. This allows an unauthenticated remote attacker to crash ntpd-rs when an...

1 affected package

rust-ntpd

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
rust-ntpd Needs evaluation Not in release Not in release
Show less packages

CVE-2023-4012

Medium priority
Ignored

ntpd will crash if the server is not NTS-enabled (no certificate) and it receives an NTS-enabled client request (mode 3).

1 affected package

ntpsec

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ntpsec Not affected Ignored Ignored Ignored
Show less packages

CVE-2023-26555

Medium priority
Needs evaluation

praecis_parse in ntpd/refclock_palisade.c in NTP 4.2.8p15 has an out-of-bounds write. Any attack method would be complex, e.g., with a manipulated GPS receiver.

1 affected package

ntp

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ntp Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2023-26554

Negligible priority
Needs evaluation

mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a '\0' character. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.

1 affected package

ntp

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ntp Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2023-26553

Negligible priority
Needs evaluation

mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when copying the trailing number. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.

1 affected package

ntp

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ntp Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2023-26552

Negligible priority
Needs evaluation

mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a decimal point. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.

1 affected package

ntp

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ntp Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2023-26551

Negligible priority
Needs evaluation

mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write in the cp<cpdec while loop. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.

1 affected package

ntp

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ntp Not in release Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2021-22212

Low priority
Ignored

ntpkeygen can generate keys that ntpd fails to parse. NTPsec 1.2.0 allows ntpkeygen to generate keys with '#' characters. ntpd then either pads, shortens the key, or fails to load these keys entirely, depending on the key type and...

1 affected package

ntpsec

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ntpsec Not affected Not affected Not affected Not affected
Show less packages