Multiple vulnerabilities have been discovered in NTP, the worst of which could lead to the execution of arbitrary code.
Package | net-misc/ntp on all architectures |
---|---|
Affected versions | < 4.2.8_p16 |
Unaffected versions | >= 4.2.8_p16 |
NTP contains software for the Network Time Protocol.
Multiple vulnerabilities have been discovered in NTP. Please review the CVE identifiers referenced below for details.
The first four of these CVEs affect a function in libntp that is only used by ntpq, but not by ntpd. The last CVE affects the driver for a hardware clock (GPS receiver), so ntpd might be vulnerable to manipulated devices of that type, but not to remote attacks.
There is no known workaround at this time.
All NTP users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/ntp-4.2.8_p16"
Release date
July 08, 2025
Latest revision
July 08, 2025: 1
Severity
normal
Exploitable
remote
Bugzilla entries