Source: rust-ntp-proto
Version: 1.6.2-4
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for rust-ntp-proto.

CVE-2026-26076[0]:
| ntpd-rs is a full-featured implementation of the Network Time
| Protocol. Prior to 1.7.1, an attacker can remotely induce moderate
| increases (2-4 times above normal) in cpu usage. When having NTS
| enabled on an ntpd-rs server, an attacker can create malformed NTS
| packets that take significantly more effort for the server to
| respond to by requesting a large number of cookies. This can lead to
| degraded server performance even when a server could otherwise
| handle the load. This vulnerability is fixed in 1.7.1.

rust-ntpd needs then to be rebuild after fixing rust-ntp-proto, right?

IMHO the issue does not warrant a DSA, so once fixed in unstable a fix
in trixie va the next point release might be good to have, and taking
care of asking SRM to rebuild as well rust-ntpd with the fixed
version.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-26076
    https://www.cve.org/CVERecord?id=CVE-2026-26076
[1] 
https://github.com/pendulum-project/ntpd-rs/security/advisories/GHSA-c7j7-rmvr-fjmv
[2] 
https://github.com/pendulum-project/ntpd-rs/commit/fa73af14d17b666b1142b9fee3ba22c18a841d24

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to