Search for packages
| purl | pkg:deb/debian/ntp@1:4.2.8p9%2Bdfsg-1?distro=bullseye |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1dne-8jh8-xbhw | ntp: Broken initial sync calculations regression |
CVE-2016-7433
|
| VCID-51cg-3jb8-p3cd | ntp: Client rate limiting and server responses |
CVE-2016-7426
|
| VCID-8g74-qxd6-jfcz | ntp: Broadcast Mode Replay Prevention DoS |
CVE-2016-7427
|
| VCID-94qw-ahj9-r3as | ntp: Zero Origin timestamp regression |
CVE-2016-7431
|
| VCID-b3ax-se39-4bbd | ntp: Mode 6 unauthenticated trap information disclosure and DDoS vector |
CVE-2016-9310
|
| VCID-h25b-hwuu-m7ck | ntp: Attack on interface selection |
CVE-2016-7429
|
| VCID-p9b7-s3jc-sbaq | ntp: read_mru_list() does inadequate incoming packet checks |
CVE-2016-7434
|
| VCID-pqur-4fx6-akc6 | ntp: Broadcast Mode Poll Interval Enforcement DoS |
CVE-2016-7428
|
| VCID-x36x-83tn-kkf4 | ntp: Null pointer dereference when trap service is enabled |
CVE-2016-9311
|