ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a packet lacks a valid origin timestamp.
https://www.oracle.com//security-alerts/cpujul2021.html
https://security.netapp.com/advisory/ntap-20200424-0002/
https://security.gentoo.org/glsa/202007-12
https://lists.debian.org/debian-lts-announce/2020/05/msg00004.html
https://bugzilla.redhat.com/show_bug.cgi?id=1716665