Action not permitted
Modal body text goes here.
CVE-2016-1548
Vulnerability from cvelistv5
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | NTP Project | NTP |
Version: 4.2.8p4 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:02:11.744Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-3096-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3096-1" }, { "name": "DSA-3629", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3629" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.talosintelligence.com/reports/TALOS-2016-0082/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "RHSA-2016:1141", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2016:1141" }, { "name": "SUSE-SU-2016:1912", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" }, { "name": "88264", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/88264" }, { "name": "VU#718152", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/718152" }, { "name": "RHSA-2016:1552", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1552.html" }, { "name": "1035705", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035705" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "name": "20160428 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: April 2016", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd" }, { "name": "FreeBSD-SA-16:16", "tags": [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc" }, { "name": "SUSE-SU-2016:2094", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" }, { "name": "openSUSE-SU-2016:1423", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" }, { "name": "GLSA-201607-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201607-15" }, { "name": "openSUSE-SU-2016:1329", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html" }, { "name": "SUSE-SU-2016:1471", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0082" }, { "name": "FEDORA-2016-5b2eb0bf9c", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html" }, { "name": "SUSE-SU-2016:1291", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" }, { "name": "DSA-3629", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2016/dsa-3629" }, { "name": "20160429 [slackware-security] ntp (SSA:2016-120-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/538233/100/0/threaded" }, { "name": "SUSE-SU-2016:1568", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" }, { "name": "20160429 [slackware-security] ntp (SSA:2016-120-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded" }, { "name": "SUSE-SU-2016:1278", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" }, { "name": "FEDORA-2016-ed8c6c0426", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "NTP", "vendor": "NTP Project", "versions": [ { "status": "affected", "version": "4.2.8p4" } ] }, { "product": "NTPSec", "vendor": "NTPsec Project", "versions": [ { "status": "affected", "version": "aa48d001683e5b791a743ec9c575aaf7d867a2b0c" } ] } ], "datePublic": "2016-04-26T00:00:00", "descriptions": [ { "lang": "en", "value": "An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-\u003edst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched." } ], "problemTypes": [ { "descriptions": [ { "description": "unspecified", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-05T17:22:11", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "USN-3096-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3096-1" }, { "name": "DSA-3629", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3629" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.talosintelligence.com/reports/TALOS-2016-0082/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "RHSA-2016:1141", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2016:1141" }, { "name": "SUSE-SU-2016:1912", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" }, { "name": "88264", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/88264" }, { "name": "VU#718152", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/718152" }, { "name": "RHSA-2016:1552", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1552.html" }, { "name": "1035705", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035705" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "name": "20160428 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: April 2016", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd" }, { "name": "FreeBSD-SA-16:16", "tags": [ "vendor-advisory", "x_refsource_FREEBSD" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc" }, { "name": "SUSE-SU-2016:2094", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" }, { "name": "openSUSE-SU-2016:1423", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" }, { "name": "GLSA-201607-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201607-15" }, { "name": "openSUSE-SU-2016:1329", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html" }, { "name": "SUSE-SU-2016:1471", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0082" }, { "name": "FEDORA-2016-5b2eb0bf9c", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html" }, { "name": "SUSE-SU-2016:1291", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" }, { "name": "DSA-3629", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2016/dsa-3629" }, { "name": "20160429 [slackware-security] ntp (SSA:2016-120-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/538233/100/0/threaded" }, { "name": "SUSE-SU-2016:1568", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" }, { "name": "20160429 [slackware-security] ntp (SSA:2016-120-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded" }, { "name": "SUSE-SU-2016:1278", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" }, { "name": "FEDORA-2016-ed8c6c0426", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2016-1548", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "NTP", "version": { "version_data": [ { "version_value": "4.2.8p4" } ] } } ] }, "vendor_name": "NTP Project" }, { "product": { "product_data": [ { "product_name": "NTPSec", "version": { "version_data": [ { "version_value": "aa48d001683e5b791a743ec9c575aaf7d867a2b0c" } ] } } ] }, "vendor_name": "NTPsec Project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-\u003edst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "unspecified" } ] } ] }, "references": { "reference_data": [ { "name": "USN-3096-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3096-1" }, { "name": "DSA-3629", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3629" }, { "name": "http://www.talosintelligence.com/reports/TALOS-2016-0082/", "refsource": "MISC", "url": "http://www.talosintelligence.com/reports/TALOS-2016-0082/" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "RHSA-2016:1141", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2016:1141" }, { "name": "SUSE-SU-2016:1912", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" }, { "name": "88264", "refsource": "BID", "url": "http://www.securityfocus.com/bid/88264" }, { "name": "VU#718152", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/718152" }, { "name": "RHSA-2016:1552", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1552.html" }, { "name": "1035705", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035705" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "https://security.netapp.com/advisory/ntap-20171004-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "name": "20160428 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: April 2016", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd" }, { "name": "FreeBSD-SA-16:16", "refsource": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc" }, { "name": "SUSE-SU-2016:2094", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" }, { "name": "openSUSE-SU-2016:1423", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" }, { "name": "GLSA-201607-15", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201607-15" }, { "name": "openSUSE-SU-2016:1329", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" }, { "name": "http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html" }, { "name": "SUSE-SU-2016:1471", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" }, { "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0082", "refsource": "MISC", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0082" }, { "name": "FEDORA-2016-5b2eb0bf9c", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html" }, { "name": "SUSE-SU-2016:1291", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" }, { "name": "DSA-3629", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2016/dsa-3629" }, { "name": "20160429 [slackware-security] ntp (SSA:2016-120-01)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/538233/100/0/threaded" }, { "name": "SUSE-SU-2016:1568", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" }, { "name": "20160429 [slackware-security] ntp (SSA:2016-120-01)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded" }, { "name": "SUSE-SU-2016:1278", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" }, { "name": "FEDORA-2016-ed8c6c0426", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2016-1548", "datePublished": "2017-01-06T21:00:00", "dateReserved": "2016-01-07T00:00:00", "dateUpdated": "2024-08-05T23:02:11.744Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-1548\",\"sourceIdentifier\":\"cret@cert.org\",\"published\":\"2017-01-06T21:59:00.353\",\"lastModified\":\"2024-11-21T02:46:37.280\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-\u003edst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.\"},{\"lang\":\"es\",\"value\":\"Un atacante puede suplantar un paquete de un servidor ntpd leg\u00edtimo con una marca de tiempo de origen que coincida con la marca de tiempo peer-\u003edst registrada para ese servidor. Despu\u00e9s de hacer este cambio, el cliente en NTP 4.2.8p4 y versiones anteriores y NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c rechazar\u00e1n todas las futuras respuestas leg\u00edtimas del servidor. Es posible forzar al cliente v\u00edctima a mover el tiempo despu\u00e9s de que el modo haya sido cambiado. ntpq no indica que el modo ha sido cambiado.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:P\",\"baseScore\":6.4,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-19\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"99C71C00-7222-483B-AEFB-159337BD3C92\"}]}]}],\"references\":[{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1552.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.debian.org/security/2016/dsa-3629\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/538233/100/0/threaded\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.securityfocus.com/bid/88264\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.securitytracker.com/id/1035705\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.talosintelligence.com/reports/TALOS-2016-0082/\",\"source\":\"cret@cert.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3096-1\",\"source\":\"cret@cert.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2016:1141\",\"source\":\"cret@cert.org\"},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf\",\"source\":\"cret@cert.org\"},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf\",\"source\":\"cret@cert.org\"},{\"url\":\"https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc\",\"source\":\"cret@cert.org\"},{\"url\":\"https://security.gentoo.org/glsa/201607-15\",\"source\":\"cret@cert.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20171004-0002/\",\"source\":\"cret@cert.org\"},{\"url\":\"https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11\",\"source\":\"cret@cert.org\"},{\"url\":\"https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11\",\"source\":\"cret@cert.org\"},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19\",\"source\":\"cret@cert.org\"},{\"url\":\"https://www.debian.org/security/2016/dsa-3629\",\"source\":\"cret@cert.org\"},{\"url\":\"https://www.kb.cert.org/vuls/id/718152\",\"source\":\"cret@cert.org\"},{\"url\":\"https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0082\",\"source\":\"cret@cert.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1552.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2016/dsa-3629\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/538233/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/88264\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1035705\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.talosintelligence.com/reports/TALOS-2016-0082/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3096-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2016:1141\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201607-15\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20171004-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2016/dsa-3629\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.kb.cert.org/vuls/id/718152\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0082\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2016_1552
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ntp is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Network Time Protocol (NTP) is used to synchronize a computer\u0027s time with another referenced time source. These packages include the ntpd service which continuously adjusts system time and utilities used to query and configure the ntpd service.\n\nSecurity Fix(es):\n\n* It was found that when NTP was configured in broadcast mode, a remote attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server, causing them to become out of sync over a longer period of time. (CVE-2015-7979)\n\n* A denial of service flaw was found in the way NTP handled preemptable client associations. A remote attacker could send several crypto NAK packets to a victim client, each with a spoofed source address of an existing associated peer, preventing that client from synchronizing its time. (CVE-2016-1547)\n\n* It was found that an ntpd client could be forced to change from basic client/server mode to the interleaved symmetric mode. A remote attacker could use a spoofed packet that, when processed by an ntpd client, would cause that client to reject all future legitimate server responses, effectively disabling time synchronization on that client. (CVE-2016-1548)\n\n* A flaw was found in the way NTP\u0027s libntp performed message authentication. An attacker able to observe the timing of the comparison function used in packet authentication could potentially use this flaw to recover the message digest. (CVE-2016-1550)\n\n* An out-of-bounds access flaw was found in the way ntpd processed certain packets. An authenticated attacker could use a crafted packet to create a peer association with hmode of 7 and larger, which could potentially (although highly unlikely) cause ntpd to crash. (CVE-2016-2518)\n\nThe CVE-2016-1548 issue was discovered by Miroslav Lichvar (Red Hat).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1552", "url": "https://access.redhat.com/errata/RHSA-2016:1552" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1300271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300271" }, { "category": "external", "summary": "1331461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331461" }, { "category": "external", "summary": "1331462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331462" }, { "category": "external", "summary": "1331464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331464" }, { "category": "external", "summary": "1331468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331468" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1552.json" } ], "title": "Red Hat Security Advisory: ntp security update", "tracking": { "current_release_date": "2024-11-22T10:04:15+00:00", "generator": { "date": "2024-11-22T10:04:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:1552", "initial_release_date": "2016-08-03T07:43:21+00:00", "revision_history": [ { "date": "2016-08-03T07:43:21+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-08-03T07:43:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T10:04:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.5?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "product_id": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.5?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.5?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.5.src", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.5.src", "product_id": "ntp-0:4.2.6p5-5.el6_7.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.5?arch=i686" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.5?arch=i686" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.5?arch=i686" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.5.i686", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.5.i686", "product_id": "ntp-0:4.2.6p5-5.el6_7.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.5?arch=s390x" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.5?arch=s390x" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.5?arch=s390x" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "product_id": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.5?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.5?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "product_id": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.5?arch=ppc64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "product": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "product_id": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-doc@4.2.6p5-5.el6_7.5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.src", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.src", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.src", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.src", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7979", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1300271" } ], "notes": [ { "category": "description", "text": "It was found that when NTP was configured in broadcast mode, a remote attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server, causing them to become out of sync over a longer period of time.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: off-path denial of service on authenticated broadcast mode", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of ntp as shipped with Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue in Red Hat Enterprise Linux 6 and 7. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7979" }, { "category": "external", "summary": "RHBZ#1300271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300271" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7979", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7979" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7979", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7979" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0076/", "url": "http://www.talosintel.com/reports/TALOS-2016-0076/" } ], "release_date": "2016-01-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-03T07:43:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the ntpd daemon will restart automatically.", "product_ids": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1552" }, { "category": "workaround", "details": "Do not use NTP\u0027s broadcast mode by not configuring the \"broadcast\" directive in the ntp.conf file.", "product_ids": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: off-path denial of service on authenticated broadcast mode" }, { "cve": "CVE-2016-1547", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331461" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way NTP handled preemptable client associations. A remote attacker could send several crypto NAK packets to a victim client, each with a spoofed source address of an existing associated peer, preventing that client from synchronizing its time.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: crypto-NAK preemptable association denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1547" }, { "category": "external", "summary": "RHBZ#1331461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331461" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1547", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1547" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0081/", "url": "http://www.talosintel.com/reports/TALOS-2016-0081/" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-03T07:43:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the ntpd daemon will restart automatically.", "product_ids": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1552" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: crypto-NAK preemptable association denial of service" }, { "acknowledgments": [ { "names": [ "Miroslav Lichvar" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-1548", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331462" } ], "notes": [ { "category": "description", "text": "It was found that an ntpd client could be forced to change from basic client/server mode to the interleaved symmetric mode. A remote attacker could use a spoofed packet that, when processed by an ntpd client, would cause that client to reject all future legitimate server responses, effectively disabling time synchronization on that client.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: ntpd switching to interleaved mode with spoofed packets", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1548" }, { "category": "external", "summary": "RHBZ#1331462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331462" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1548", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1548" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0082/", "url": "http://www.talosintel.com/reports/TALOS-2016-0082/" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-03T07:43:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the ntpd daemon will restart automatically.", "product_ids": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1552" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: ntpd switching to interleaved mode with spoofed packets" }, { "cve": "CVE-2016-1550", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331464" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way NTP\u0027s libntp performed message authentication. An attacker able to observe the timing of the comparison function used in packet authentication could potentially use this flaw to recover the message digest.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: libntp message digest disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1550" }, { "category": "external", "summary": "RHBZ#1331464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1550", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1550" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0084/", "url": "http://www.talosintel.com/reports/TALOS-2016-0084/" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-03T07:43:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the ntpd daemon will restart automatically.", "product_ids": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1552" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "ntp: libntp message digest disclosure" }, { "cve": "CVE-2016-2518", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331468" } ], "notes": [ { "category": "description", "text": "An out-of-bounds access flaw was found in the way ntpd processed certain packets. An authenticated attacker could use a crafted packet to create a peer association with hmode of 7 and larger, which could potentially (although highly unlikely) cause ntpd to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: out-of-bounds references on crafted packet", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2518" }, { "category": "external", "summary": "RHBZ#1331468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331468" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2518", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2518" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-03T07:43:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the ntpd daemon will restart automatically.", "product_ids": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1552" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:S/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "ntp: out-of-bounds references on crafted packet" } ] }
rhsa-2016_1141
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ntp is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Network Time Protocol (NTP) is used to synchronize a computer\u0027s time with another referenced time source. These packages include the ntpd service which continuously adjusts system time and utilities used to query and configure the ntpd service.\n\nSecurity Fix(es):\n\n* It was found that when NTP was configured in broadcast mode, a remote attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server, causing them to become out of sync over a longer period of time. (CVE-2015-7979)\n\n* A denial of service flaw was found in the way NTP handled preemptable client associations. A remote attacker could send several crypto NAK packets to a victim client, each with a spoofed source address of an existing associated peer, preventing that client from synchronizing its time. (CVE-2016-1547)\n\n* It was found that an ntpd client could be forced to change from basic client/server mode to the interleaved symmetric mode. A remote attacker could use a spoofed packet that, when processed by an ntpd client, would cause that client to reject all future legitimate server responses, effectively disabling time synchronization on that client. (CVE-2016-1548)\n\n* A flaw was found in the way NTP\u0027s libntp performed message authentication. An attacker able to observe the timing of the comparison function used in packet authentication could potentially use this flaw to recover the message digest. (CVE-2016-1550)\n\n* An out-of-bounds access flaw was found in the way ntpd processed certain packets. An authenticated attacker could use a crafted packet to create a peer association with hmode of 7 and larger, which could potentially (although highly unlikely) cause ntpd to crash. (CVE-2016-2518)\n\nThe CVE-2016-1548 issue was discovered by Miroslav Lichvar (Red Hat).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1141", "url": "https://access.redhat.com/errata/RHSA-2016:1141" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1300271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300271" }, { "category": "external", "summary": "1331461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331461" }, { "category": "external", "summary": "1331462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331462" }, { "category": "external", "summary": "1331464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331464" }, { "category": "external", "summary": "1331468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331468" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1141.json" } ], "title": "Red Hat Security Advisory: ntp security update", "tracking": { "current_release_date": "2024-11-22T10:04:09+00:00", "generator": { "date": "2024-11-22T10:04:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:1141", "initial_release_date": "2016-05-31T08:11:54+00:00", "revision_history": [ { "date": "2016-05-31T08:11:54+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-05-31T08:11:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T10:04:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.2.src", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src", "product_id": "ntp-0:4.2.6p5-22.el7_2.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.2?arch=src" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-10.el6.1.src", "product": { "name": "ntp-0:4.2.6p5-10.el6.1.src", "product_id": "ntp-0:4.2.6p5-10.el6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-10.el6.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "product_id": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "product_id": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-10.el6.1.x86_64", "product": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64", "product_id": "ntp-0:4.2.6p5-10.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-10.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "product_id": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-10.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "product": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "product_id": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-10.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "product": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "product_id": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-10.el6.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "product": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "product_id": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-22.el7_2.2?arch=noarch" } } }, { "category": "product_version", "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "product": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "product_id": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-doc@4.2.6p5-22.el7_2.2?arch=noarch" } } }, { "category": "product_version", "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "product": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "product_id": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-doc@4.2.6p5-10.el6.1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "product_id": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.2?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.2?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "product_id": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.2?arch=ppc64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.2?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "product_id": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-10.el6.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "product": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "product_id": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-10.el6.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-10.el6.1.ppc64", "product": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64", "product_id": "ntp-0:4.2.6p5-10.el6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-10.el6.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "product": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "product_id": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-10.el6.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "product_id": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "product_id": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "product_id": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.2?arch=s390x" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.2?arch=s390x" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "product_id": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.2?arch=s390x" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.2?arch=s390x" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-10.el6.1.s390x", "product": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x", "product_id": "ntp-0:4.2.6p5-10.el6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-10.el6.1?arch=s390x" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "product": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "product_id": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-10.el6.1?arch=s390x" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "product": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "product_id": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-10.el6.1?arch=s390x" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "product": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "product_id": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-10.el6.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ntp-0:4.2.6p5-10.el6.1.i686", "product": { "name": "ntp-0:4.2.6p5-10.el6.1.i686", "product_id": "ntp-0:4.2.6p5-10.el6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-10.el6.1?arch=i686" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-10.el6.1.i686", "product": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686", "product_id": "ntpdate-0:4.2.6p5-10.el6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-10.el6.1?arch=i686" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "product": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "product_id": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-10.el6.1?arch=i686" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "product": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "product_id": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-10.el6.1?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7979", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1300271" } ], "notes": [ { "category": "description", "text": "It was found that when NTP was configured in broadcast mode, a remote attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server, causing them to become out of sync over a longer period of time.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: off-path denial of service on authenticated broadcast mode", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of ntp as shipped with Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue in Red Hat Enterprise Linux 6 and 7. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7979" }, { "category": "external", "summary": "RHBZ#1300271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300271" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7979", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7979" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7979", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7979" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0076/", "url": "http://www.talosintel.com/reports/TALOS-2016-0076/" } ], "release_date": "2016-01-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-31T08:11:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1141" }, { "category": "workaround", "details": "Do not use NTP\u0027s broadcast mode by not configuring the \"broadcast\" directive in the ntp.conf file.", "product_ids": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: off-path denial of service on authenticated broadcast mode" }, { "cve": "CVE-2016-1547", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331461" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way NTP handled preemptable client associations. A remote attacker could send several crypto NAK packets to a victim client, each with a spoofed source address of an existing associated peer, preventing that client from synchronizing its time.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: crypto-NAK preemptable association denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1547" }, { "category": "external", "summary": "RHBZ#1331461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331461" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1547", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1547" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0081/", "url": "http://www.talosintel.com/reports/TALOS-2016-0081/" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-31T08:11:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1141" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: crypto-NAK preemptable association denial of service" }, { "acknowledgments": [ { "names": [ "Miroslav Lichvar" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-1548", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331462" } ], "notes": [ { "category": "description", "text": "It was found that an ntpd client could be forced to change from basic client/server mode to the interleaved symmetric mode. A remote attacker could use a spoofed packet that, when processed by an ntpd client, would cause that client to reject all future legitimate server responses, effectively disabling time synchronization on that client.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: ntpd switching to interleaved mode with spoofed packets", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1548" }, { "category": "external", "summary": "RHBZ#1331462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331462" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1548", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1548" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0082/", "url": "http://www.talosintel.com/reports/TALOS-2016-0082/" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-31T08:11:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1141" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: ntpd switching to interleaved mode with spoofed packets" }, { "cve": "CVE-2016-1550", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331464" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way NTP\u0027s libntp performed message authentication. An attacker able to observe the timing of the comparison function used in packet authentication could potentially use this flaw to recover the message digest.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: libntp message digest disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1550" }, { "category": "external", "summary": "RHBZ#1331464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1550", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1550" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0084/", "url": "http://www.talosintel.com/reports/TALOS-2016-0084/" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-31T08:11:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1141" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "ntp: libntp message digest disclosure" }, { "cve": "CVE-2016-2518", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331468" } ], "notes": [ { "category": "description", "text": "An out-of-bounds access flaw was found in the way ntpd processed certain packets. An authenticated attacker could use a crafted packet to create a peer association with hmode of 7 and larger, which could potentially (although highly unlikely) cause ntpd to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: out-of-bounds references on crafted packet", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2518" }, { "category": "external", "summary": "RHBZ#1331468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331468" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2518", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2518" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-31T08:11:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1141" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:S/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "ntp: out-of-bounds references on crafted packet" } ] }
icsa-21-103-11
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "summary", "text": "Siemens reported these vulnerabilities to CISA.", "title": "Summary" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "CISAservicedesk@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-21-103-11 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-103-11.json" }, { "category": "self", "summary": "ICS Advisory ICSA-21-103-11 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-103-11" } ], "title": "ICSA-21-103-11_Siemens TIM 4R-IE Devices", "tracking": { "current_release_date": "2021-04-13T00:00:00.000000Z", "generator": { "engine": { "name": "CISA USCert CSAF Generator", "version": "1" } }, "id": "ICSA-21-103-11", "initial_release_date": "2021-04-13T00:00:00.000000Z", "revision_history": [ { "date": "2021-04-13T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-21-103-11 Siemens TIM 4R-IE Devices" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "TIM 4R-IE DNP3 (incl. SIPLUS NET variants): All versions", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "TIM 4R-IE DNP3 (incl. SIPLUS NET variants)" }, { "branches": [ { "category": "product_version", "name": "vers:all/*", "product": { "name": "TIM 4R-IE (incl. SIPLUS NET variants): All versions", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "TIM 4R-IE (incl. SIPLUS NET variants)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-5219", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "The ULOGTOD function in ntp.d in SNTP before 4.2.7p366 does not properly perform type conversions from a precision value to a double, which allows remote attackers to cause a denial of service (infinite loop) via a crafted NTP packet.CVE-2015-5219 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens operational guidelines for Industrial Security and following the recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "title": "CVE-2015-5219" }, { "cve": "CVE-2015-7855", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (assertion failure) via a 6 or mode 7 packet containing a long data value.CVE-2015-7855 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens operational guidelines for Industrial Security and following the recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "title": "CVE-2015-7855" }, { "cve": "CVE-2015-7871", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to bypass authentication. CVE-2015-7871 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens operational guidelines for Industrial Security and following the recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "title": "CVE-2015-7871" }, { "cve": "CVE-2015-7973", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90, when configured in broadcast mode, allows man-in-the-middle attackers to conduct replay attacks by sniffing the network.CVE-2015-7973 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "remediations": [ { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens operational guidelines for Industrial Security and following the recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "title": "CVE-2015-7973" }, { "cve": "CVE-2015-7974", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a skeleton key.CVE-2015-7974 has been assigned to this vulnerability. A CVSS v3 base score of 7.7 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens operational guidelines for Industrial Security and following the recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "title": "CVE-2015-7974" }, { "cve": "CVE-2015-7977", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "ntpd in NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (NULL pointer dereference) via a ntpdc reslist command.CVE-2015-7977 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens operational guidelines for Industrial Security and following the recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "title": "CVE-2015-7977" }, { "cve": "CVE-2015-7979", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (client-server association tear down) by sending broadcast packets with invalid authentication to a broadcast client.CVE-2015-7979 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens operational guidelines for Industrial Security and following the recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "title": "CVE-2015-7979" }, { "cve": "CVE-2015-7705", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.CVE-2015-7705 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens operational guidelines for Industrial Security and following the recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "title": "CVE-2015-7705" }, { "cve": "CVE-2015-8138", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.CVE-2015-8138 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens operational guidelines for Industrial Security and following the recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "title": "CVE-2015-8138" }, { "cve": "CVE-2016-1547", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled.CVE-2016-1547 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens operational guidelines for Industrial Security and following the recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "title": "CVE-2016-1547" }, { "cve": "CVE-2016-1548", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-\u003edst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.CVE-2016-1548 has been assigned to this vulnerability. A CVSS v3 base score of 7.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L" } ], "remediations": [ { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens operational guidelines for Industrial Security and following the recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "title": "CVE-2016-1548" }, { "cve": "CVE-2016-1550", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest key.CVE-2016-1550 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens operational guidelines for Industrial Security and following the recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "title": "CVE-2016-1550" }, { "cve": "CVE-2016-4953", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (ephemeralassociation demobilization) by sending a spoofed crypto-NAK packet with incorrect authentication data at a certain time.CVE-2016-4953 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens operational guidelines for Industrial Security and following the recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "title": "CVE-2016-4953" }, { "cve": "CVE-2016-4954", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.CVE-2016-4954 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends protecting network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens operational guidelines for Industrial Security and following the recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002" ], "url": "https://cert-portal.siemens.com/operational-guidelines-industrial-security.pdf" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002" ] } ], "title": "CVE-2016-4954" } ] }
icsa-21-159-11
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could create a denial-of-service condition as well as other specified and unspecified impacts.", "title": "Risk evaluation" }, { "category": "other", "text": "Multiple Sectors", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.\nCISA also provides a section for control systems security recommended practices on the ICS webpage onus-cert.cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.\nOrganizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "external", "summary": "SSA-211752: Multiple NTP-Client Related Vulnerabilities in SIMATIC CP 443-1 OPC UA - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-211752.json" }, { "category": "self", "summary": "ICS Advisory ICSA-21-159-11 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-159-11.json" }, { "category": "self", "summary": "ICS Advisory ICSA-21-159-11 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-159-11" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/ics/tips/ICS-TIP-12-146-01B" }, { "category": "external", "summary": "SSA-211752: Multiple NTP-Client Related Vulnerabilities in SIMATIC CP 443-1 OPC UA - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "category": "external", "summary": "SSA-211752: Multiple NTP-Client Related Vulnerabilities in SIMATIC CP 443-1 OPC UA - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-211752.txt" } ], "title": "Siemens SIMATIC NET CP 443-1 OPC UA", "tracking": { "current_release_date": "2021-06-08T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-21-159-11", "initial_release_date": "2021-06-08T00:00:00.000000Z", "revision_history": [ { "date": "2021-06-08T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-21-159-11 Siemens SIMATIC NET CP 443-1 OPC UA" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 443-1 OPC UA (6GK7443-1UX00-0XE0)", "product_id": "CSAFPID-0001", "product_identification_helper": { "model_numbers": [ "6GK7443-1UX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 443-1 OPC UA" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7705", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2015-7705 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2015-7705.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7705" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2015-7705" }, { "cve": "CVE-2015-7853", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2015-7853 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2015-7853.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7853" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2015-7853" }, { "cve": "CVE-2015-8138", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2015-8138 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2015-8138.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8138" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2015-8138" }, { "cve": "CVE-2016-1547", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-1547 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-1547.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1547" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-1547" }, { "cve": "CVE-2016-1548", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "notes": [ { "category": "summary", "text": "An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-\u003edst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-1548 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-1548.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1548" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-1548" }, { "cve": "CVE-2016-1550", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest key.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-1550 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-1550.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1550" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-1550" }, { "cve": "CVE-2016-2518", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-2518 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-2518.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2518" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-2518" }, { "cve": "CVE-2016-4953", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (ephemeral-association demobilization) by sending a spoofed crypto-NAK packet with incorrect authentication data at a certain time.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-4953 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-4953.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-4953" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-4953" }, { "cve": "CVE-2016-4954", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-4954 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-4954.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-4954" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-4954" }, { "cve": "CVE-2016-4955", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "ntpd in NTP 4.x before 4.2.8p8, when autokey is enabled, allows remote attackers to cause a denial of service (peer-variable clearing and association outage) by sending (1) a spoofed crypto-NAK packet or (2) a packet with an incorrect MAC value at a certain time.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-4955 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-4955.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-4955" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-4955" }, { "cve": "CVE-2016-4956", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (interleaved-mode transition and time change) via a spoofed broadcast packet. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-1548.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-4956 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-4956.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-4956" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-4956" }, { "cve": "CVE-2016-7431", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "NTP before 4.2.8p9 allows remote attackers to bypass the origin timestamp protection mechanism via an origin timestamp of zero. NOTE: this vulnerability exists because of a CVE-2015-8138 regression.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-7431 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-7431.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-7431" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-7431" }, { "cve": "CVE-2016-7433", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "notes": [ { "category": "summary", "text": "NTP before 4.2.8p9 does not properly perform the initial sync calculations, which allows remote attackers to unspecified impact via unknown vectors, related to a \"root distance that did not include the peer dispersion.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-7433 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-7433.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-7433" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-7433" }, { "cve": "CVE-2016-9042", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-9042 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-9042.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9042" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-9042" }, { "cve": "CVE-2017-6458", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2017-6458 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2017-6458.json" }, { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-6548" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2017-6458" } ] }
var-201701-1137
Vulnerability from variot
An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer->dst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched. The NTP.org reference implementation of ntpd contains multiple vulnerabilities. NTP is prone to a security-bypass vulnerability. An attacker can exploit this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks. Versions prior to NTP 4.2.8p7 and 4.3.x versions prior to 4.3.92 are vulnerable. ========================================================================== Ubuntu Security Notice USN-3096-1 October 05, 2016
ntp vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in NTP. (CVE-2015-7973)
Matt Street discovered that NTP incorrectly verified peer associations of symmetric keys. (CVE-2015-7974)
Jonathan Gardner discovered that the NTP ntpq utility incorrectly handled memory. An attacker could possibly use this issue to cause ntpq to crash, resulting in a denial of service. This issue only affected Ubuntu 16.04 LTS. (CVE-2015-7975)
Jonathan Gardner discovered that the NTP ntpq utility incorrectly handled dangerous characters in filenames. An attacker could possibly use this issue to overwrite arbitrary files. (CVE-2015-7976)
Stephen Gray discovered that NTP incorrectly handled large restrict lists. (CVE-2015-7977, CVE-2015-7978)
Aanchal Malhotra discovered that NTP incorrectly handled authenticated broadcast mode. (CVE-2015-7979)
Jonathan Gardner discovered that NTP incorrectly handled origin timestamp checks. A remote attacker could use this issue to spoof peer servers. (CVE-2015-8138)
Jonathan Gardner discovered that the NTP ntpq utility did not properly handle certain incorrect values. An attacker could possibly use this issue to cause ntpq to hang, resulting in a denial of service. (CVE-2015-8158)
It was discovered that the NTP cronjob incorrectly cleaned up the statistics directory. A local attacker could possibly use this to escalate privileges. (CVE-2016-0727)
Stephen Gray and Matthew Van Gundy discovered that NTP incorrectly validated crypto-NAKs. A remote attacker could possibly use this issue to prevent clients from synchronizing. A remote attacker could possibly use this issue to prevent clients from synchronizing. (CVE-2016-1548)
Matthew Van Gundy, Stephen Gray and Loganaden Velvindron discovered that NTP incorrectly handled message authentication. (CVE-2016-1550)
Yihan Lian discovered that NTP incorrectly handled duplicate IPs on unconfig directives. A remote attacker could possibly use this issue to cause a denial of service. A remote attacker could possibly use this issue to cause a denial of service. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2016-4956)
In the default installation, attackers would be isolated by the NTP AppArmor profile.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04 LTS: ntp 1:4.2.8p4+dfsg-3ubuntu5.3
Ubuntu 14.04 LTS: ntp 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10
Ubuntu 12.04 LTS: ntp 1:4.2.6.p3+dfsg-1ubuntu3.11
In general, a standard system update will make all the necessary changes. 6.7) - i386, noarch, ppc64, s390x, x86_64
Gentoo Linux Security Advisory GLSA 201607-15
https://security.gentoo.org/
Severity: Normal Title: NTP: Multiple vulnerabilities Date: July 20, 2016 Bugs: #563774, #572452, #581528, #584954 ID: 201607-15
Synopsis
Multiple vulnerabilities have been found in NTP, the worst of which could lead to Denial of Service.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/ntp < 4.2.8_p8 >= 4.2.8_p8
Description
Multiple vulnerabilities have been discovered in NTP. Please review the CVE identifiers referenced below for details.
Workaround
There is no known workaround at this time.
Resolution
All NTP users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/ntp-4.2.8_p8"
References
[ 1 ] CVE-2015-7691 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7691 [ 2 ] CVE-2015-7692 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7692 [ 3 ] CVE-2015-7701 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7701 [ 4 ] CVE-2015-7702 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7702 [ 5 ] CVE-2015-7703 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7703 [ 6 ] CVE-2015-7704 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7704 [ 7 ] CVE-2015-7705 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7705 [ 8 ] CVE-2015-7848 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7848 [ 9 ] CVE-2015-7849 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7849 [ 10 ] CVE-2015-7850 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7850 [ 11 ] CVE-2015-7851 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7851 [ 12 ] CVE-2015-7852 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7852 [ 13 ] CVE-2015-7853 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7853 [ 14 ] CVE-2015-7854 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7854 [ 15 ] CVE-2015-7855 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7855 [ 16 ] CVE-2015-7871 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7871 [ 17 ] CVE-2015-7973 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7973 [ 18 ] CVE-2015-7974 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7974 [ 19 ] CVE-2015-7975 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7975 [ 20 ] CVE-2015-7976 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7976 [ 21 ] CVE-2015-7977 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7977 [ 22 ] CVE-2015-7978 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7978 [ 23 ] CVE-2015-7979 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7979 [ 24 ] CVE-2015-8138 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8138 [ 25 ] CVE-2015-8139 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8139 [ 26 ] CVE-2015-8140 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8140 [ 27 ] CVE-2015-8158 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8158 [ 28 ] CVE-2016-1547 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1547 [ 29 ] CVE-2016-1548 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1548 [ 30 ] CVE-2016-1549 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1549 [ 31 ] CVE-2016-1550 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1550 [ 32 ] CVE-2016-1551 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1551 [ 33 ] CVE-2016-2516 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2516 [ 34 ] CVE-2016-2517 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2517 [ 35 ] CVE-2016-2518 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2518 [ 36 ] CVE-2016-2519 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2519 [ 37 ] CVE-2016-4953 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4953 [ 38 ] CVE-2016-4954 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4954 [ 39 ] CVE-2016-4955 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4955 [ 40 ] CVE-2016-4956 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4956 [ 41 ] CVE-2016-4957 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4957
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201607-15
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: ntp security update Advisory ID: RHSA-2016:1141-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2016:1141 Issue date: 2016-05-31 CVE Names: CVE-2015-7979 CVE-2016-1547 CVE-2016-1548 CVE-2016-1550 CVE-2016-2518 =====================================================================
- Summary:
An update for ntp is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64
- Description:
The Network Time Protocol (NTP) is used to synchronize a computer's time with another referenced time source. These packages include the ntpd service which continuously adjusts system time and utilities used to query and configure the ntpd service.
Security Fix(es):
-
It was found that when NTP was configured in broadcast mode, a remote attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server, causing them to become out of sync over a longer period of time. (CVE-2015-7979)
-
A denial of service flaw was found in the way NTP handled preemptable client associations. A remote attacker could send several crypto NAK packets to a victim client, each with a spoofed source address of an existing associated peer, preventing that client from synchronizing its time. (CVE-2016-1547)
-
It was found that an ntpd client could be forced to change from basic client/server mode to the interleaved symmetric mode. (CVE-2016-1548)
-
A flaw was found in the way NTP's libntp performed message authentication. An attacker able to observe the timing of the comparison function used in packet authentication could potentially use this flaw to recover the message digest. (CVE-2016-1550)
-
An out-of-bounds access flaw was found in the way ntpd processed certain packets. An authenticated attacker could use a crafted packet to create a peer association with hmode of 7 and larger, which could potentially (although highly unlikely) cause ntpd to crash. (CVE-2016-2518)
The CVE-2016-1548 issue was discovered by Miroslav Lichvar (Red Hat).
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1300271 - CVE-2015-7979 ntp: off-path denial of service on authenticated broadcast mode 1331461 - CVE-2016-1547 ntp: crypto-NAK preemptable association denial of service 1331462 - CVE-2016-1548 ntp: ntpd switching to interleaved mode with spoofed packets 1331464 - CVE-2016-1550 ntp: libntp message digest disclosure 1331468 - CVE-2016-2518 ntp: out-of-bounds references on crafted packet
- Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source: ntp-4.2.6p5-10.el6.1.src.rpm
i386: ntp-4.2.6p5-10.el6.1.i686.rpm ntp-debuginfo-4.2.6p5-10.el6.1.i686.rpm ntpdate-4.2.6p5-10.el6.1.i686.rpm
x86_64: ntp-4.2.6p5-10.el6.1.x86_64.rpm ntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm ntpdate-4.2.6p5-10.el6.1.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
i386: ntp-debuginfo-4.2.6p5-10.el6.1.i686.rpm ntp-perl-4.2.6p5-10.el6.1.i686.rpm
noarch: ntp-doc-4.2.6p5-10.el6.1.noarch.rpm
x86_64: ntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm ntp-perl-4.2.6p5-10.el6.1.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: ntp-4.2.6p5-10.el6.1.src.rpm
x86_64: ntp-4.2.6p5-10.el6.1.x86_64.rpm ntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm ntpdate-4.2.6p5-10.el6.1.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
noarch: ntp-doc-4.2.6p5-10.el6.1.noarch.rpm
x86_64: ntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm ntp-perl-4.2.6p5-10.el6.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: ntp-4.2.6p5-10.el6.1.src.rpm
i386: ntp-4.2.6p5-10.el6.1.i686.rpm ntp-debuginfo-4.2.6p5-10.el6.1.i686.rpm ntpdate-4.2.6p5-10.el6.1.i686.rpm
ppc64: ntp-4.2.6p5-10.el6.1.ppc64.rpm ntp-debuginfo-4.2.6p5-10.el6.1.ppc64.rpm ntpdate-4.2.6p5-10.el6.1.ppc64.rpm
s390x: ntp-4.2.6p5-10.el6.1.s390x.rpm ntp-debuginfo-4.2.6p5-10.el6.1.s390x.rpm ntpdate-4.2.6p5-10.el6.1.s390x.rpm
x86_64: ntp-4.2.6p5-10.el6.1.x86_64.rpm ntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm ntpdate-4.2.6p5-10.el6.1.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
i386: ntp-debuginfo-4.2.6p5-10.el6.1.i686.rpm ntp-perl-4.2.6p5-10.el6.1.i686.rpm
noarch: ntp-doc-4.2.6p5-10.el6.1.noarch.rpm
ppc64: ntp-debuginfo-4.2.6p5-10.el6.1.ppc64.rpm ntp-perl-4.2.6p5-10.el6.1.ppc64.rpm
s390x: ntp-debuginfo-4.2.6p5-10.el6.1.s390x.rpm ntp-perl-4.2.6p5-10.el6.1.s390x.rpm
x86_64: ntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm ntp-perl-4.2.6p5-10.el6.1.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: ntp-4.2.6p5-10.el6.1.src.rpm
i386: ntp-4.2.6p5-10.el6.1.i686.rpm ntp-debuginfo-4.2.6p5-10.el6.1.i686.rpm ntpdate-4.2.6p5-10.el6.1.i686.rpm
x86_64: ntp-4.2.6p5-10.el6.1.x86_64.rpm ntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm ntpdate-4.2.6p5-10.el6.1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
i386: ntp-debuginfo-4.2.6p5-10.el6.1.i686.rpm ntp-perl-4.2.6p5-10.el6.1.i686.rpm
noarch: ntp-doc-4.2.6p5-10.el6.1.noarch.rpm
x86_64: ntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm ntp-perl-4.2.6p5-10.el6.1.x86_64.rpm
Red Hat Enterprise Linux Client (v. 7):
Source: ntp-4.2.6p5-22.el7_2.2.src.rpm
x86_64: ntp-4.2.6p5-22.el7_2.2.x86_64.rpm ntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm ntpdate-4.2.6p5-22.el7_2.2.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
noarch: ntp-doc-4.2.6p5-22.el7_2.2.noarch.rpm ntp-perl-4.2.6p5-22.el7_2.2.noarch.rpm
x86_64: ntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm sntp-4.2.6p5-22.el7_2.2.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: ntp-4.2.6p5-22.el7_2.2.src.rpm
x86_64: ntp-4.2.6p5-22.el7_2.2.x86_64.rpm ntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm ntpdate-4.2.6p5-22.el7_2.2.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
noarch: ntp-doc-4.2.6p5-22.el7_2.2.noarch.rpm ntp-perl-4.2.6p5-22.el7_2.2.noarch.rpm
x86_64: ntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm sntp-4.2.6p5-22.el7_2.2.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: ntp-4.2.6p5-22.el7_2.2.src.rpm
ppc64: ntp-4.2.6p5-22.el7_2.2.ppc64.rpm ntp-debuginfo-4.2.6p5-22.el7_2.2.ppc64.rpm ntpdate-4.2.6p5-22.el7_2.2.ppc64.rpm
ppc64le: ntp-4.2.6p5-22.el7_2.2.ppc64le.rpm ntp-debuginfo-4.2.6p5-22.el7_2.2.ppc64le.rpm ntpdate-4.2.6p5-22.el7_2.2.ppc64le.rpm
s390x: ntp-4.2.6p5-22.el7_2.2.s390x.rpm ntp-debuginfo-4.2.6p5-22.el7_2.2.s390x.rpm ntpdate-4.2.6p5-22.el7_2.2.s390x.rpm
x86_64: ntp-4.2.6p5-22.el7_2.2.x86_64.rpm ntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm ntpdate-4.2.6p5-22.el7_2.2.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
noarch: ntp-doc-4.2.6p5-22.el7_2.2.noarch.rpm ntp-perl-4.2.6p5-22.el7_2.2.noarch.rpm
ppc64: ntp-debuginfo-4.2.6p5-22.el7_2.2.ppc64.rpm sntp-4.2.6p5-22.el7_2.2.ppc64.rpm
ppc64le: ntp-debuginfo-4.2.6p5-22.el7_2.2.ppc64le.rpm sntp-4.2.6p5-22.el7_2.2.ppc64le.rpm
s390x: ntp-debuginfo-4.2.6p5-22.el7_2.2.s390x.rpm sntp-4.2.6p5-22.el7_2.2.s390x.rpm
x86_64: ntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm sntp-4.2.6p5-22.el7_2.2.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: ntp-4.2.6p5-22.el7_2.2.src.rpm
x86_64: ntp-4.2.6p5-22.el7_2.2.x86_64.rpm ntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm ntpdate-4.2.6p5-22.el7_2.2.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
noarch: ntp-doc-4.2.6p5-22.el7_2.2.noarch.rpm ntp-perl-4.2.6p5-22.el7_2.2.noarch.rpm
x86_64: ntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm sntp-4.2.6p5-22.el7_2.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2015-7979 https://access.redhat.com/security/cve/CVE-2016-1547 https://access.redhat.com/security/cve/CVE-2016-1548 https://access.redhat.com/security/cve/CVE-2016-1550 https://access.redhat.com/security/cve/CVE-2016-2518 https://access.redhat.com/security/updates/classification/#moderate
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFXTUp2XlSAg2UNWIIRAqUmAKC32P98McZUqU1gzWxBbCz0hn0eagCfRtrx SULnKXrtTJd5iJ6eQVtDnxA= =hETy -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce .
Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/ntp-4.2.8p7-i486-1_slack14.1.txz: Upgraded. This release patches several low and medium severity security issues: CVE-2016-1551: Refclock impersonation vulnerability, AKA: refclock-peering CVE-2016-1549: Sybil vulnerability: ephemeral association attack, AKA: ntp-sybil - MITIGATION ONLY CVE-2016-2516: Duplicate IPs on unconfig directives will cause an assertion botch CVE-2016-2517: Remote configuration trustedkey/requestkey values are not properly validated CVE-2016-2518: Crafted addpeer with hmode > 7 causes array wraparound with MATCH_ASSOC CVE-2016-2519: ctl_getitem() return value not always checked CVE-2016-1547: Validate crypto-NAKs, AKA: nak-dos CVE-2016-1548: Interleave-pivot - MITIGATION ONLY CVE-2015-7704: KoD fix: peer associations were broken by the fix for NtpBug2901, AKA: Symmetric active/passive mode is broken CVE-2015-8138: Zero Origin Timestamp Bypass, AKA: Additional KoD Checks CVE-2016-1550: Improve NTP security against buffer comparison timing attacks, authdecrypt-timing, AKA: authdecrypt-timing For more information, see: http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1549 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1551 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2517 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2519 ( Security fix ) +--------------------------+
Where to find the new packages: +-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.
Updated package for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/ntp-4.2.8p7-i486-1_slack13.0.txz
Updated package for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/ntp-4.2.8p7-x86_64-1_slack13.0.txz
Updated package for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/ntp-4.2.8p7-i486-1_slack13.1.txz
Updated package for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/ntp-4.2.8p7-x86_64-1_slack13.1.txz
Updated package for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/ntp-4.2.8p7-i486-1_slack13.37.txz
Updated package for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/ntp-4.2.8p7-x86_64-1_slack13.37.txz
Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/ntp-4.2.8p7-i486-1_slack14.0.txz
Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/ntp-4.2.8p7-x86_64-1_slack14.0.txz
Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/ntp-4.2.8p7-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/ntp-4.2.8p7-x86_64-1_slack14.1.txz
Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/ntp-4.2.8p7-i586-1.txz
Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/ntp-4.2.8p7-x86_64-1.txz
MD5 signatures: +-------------+
Slackware 13.0 package: 785dc2ef5f80edb28dc781e261c3fe3f ntp-4.2.8p7-i486-1_slack13.0.txz
Slackware x86_64 13.0 package: 899421096b7b63e6cb269f8b01dfd875 ntp-4.2.8p7-x86_64-1_slack13.0.txz
Slackware 13.1 package: dfd34cbd31be3572a2bcae7f59cdfd91 ntp-4.2.8p7-i486-1_slack13.1.txz
Slackware x86_64 13.1 package: 63c4b31736040e7950361cd0d7081c8b ntp-4.2.8p7-x86_64-1_slack13.1.txz
Slackware 13.37 package: e760ae0c6cc3fa933e4d65d6995b0c84 ntp-4.2.8p7-i486-1_slack13.37.txz
Slackware x86_64 13.37 package: aa448523b27bb4fcccc2f46cf4d72bc5 ntp-4.2.8p7-x86_64-1_slack13.37.txz
Slackware 14.0 package: 3bc7e54a4164a4f91be996b5cf2e643e ntp-4.2.8p7-i486-1_slack14.0.txz
Slackware x86_64 14.0 package: 0f6ea4dae476709f26f5d0e33378576c ntp-4.2.8p7-x86_64-1_slack14.0.txz
Slackware 14.1 package: dbe827ee7ece6ce5ca083cdd5960162c ntp-4.2.8p7-i486-1_slack14.1.txz
Slackware x86_64 14.1 package: 89f3edf183a6a9847d69b8349f98c901 ntp-4.2.8p7-x86_64-1_slack14.1.txz
Slackware -current package: 4018b86edd15e40e8c5e9f50d907dcff n/ntp-4.2.8p7-i586-1.txz
Slackware x86_64 -current package: 7dd6b64ba8c9fdaebb7becc1f5c3963d n/ntp-4.2.8p7-x86_64-1.txz
Installation instructions: +------------------------+
Upgrade the package as root:
upgradepkg ntp-4.2.8p7-i486-1_slack14.1.txz
Then, restart the NTP daemon:
sh /etc/rc.d/rc.ntpd restart
+-----+
Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com
+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address.
CVE-2015-7977 / CVE-2015-7978
Stephen Gray discovered that a NULL pointer dereference and a
buffer overflow in the handling of "ntpdc reslist" commands may
result in denial of service.
CVE-2016-2518
Yihan Lian discovered that an OOB memory access could potentially
crash ntpd.
For the stable distribution (jessie), these problems have been fixed in version 1:4.2.6.p5+dfsg-7+deb8u2.
For the testing distribution (stretch), these problems have been fixed in version 1:4.2.8p7+dfsg-1.
For the unstable distribution (sid), these problems have been fixed in version 1:4.2.8p7+dfsg-1.
We recommend that you upgrade your ntp packages
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201701-1137", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ntp", "scope": "eq", "trust": 1.9, "vendor": "ntp", "version": "4.2.8" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ntp", "version": null }, { "model": "ntp", "scope": "eq", "trust": 0.8, "vendor": "ntp", "version": null }, { "model": "ntp", "scope": "lte", "trust": 0.8, "vendor": "ntp", "version": "4.2.8p4 and earlier" }, { "model": "ntp", "scope": null, "trust": 0.8, "vendor": "ntp", "version": null }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.0" }, { "model": "telepresence isdn link", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "physical access manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ntp", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.3.77" }, { "model": "security access manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.0.1" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.3" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.2" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.02" }, { "model": "dcm series 9900-digital content manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "application policy infrastructure controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.9" }, { "model": "ntp", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.3.25" }, { "model": "powerkvm", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.0" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.6" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.4" }, { "model": "network analysis module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "nexus series switches", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "90000" }, { "model": "security access manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.1.0" }, { "model": "4.2.8p4", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.20" }, { "model": "prime infrastructure", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.5" }, { "model": "security network protection", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "5.3.2.4" }, { "model": "exalogic infrastructure", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0" }, { "model": "nac guest server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "enterprise content delivery system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "identity services engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.2.1" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1.1" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.4" }, { "model": "4.2.8p6", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.7" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.18" }, { "model": "security privileged identity manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.1" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "powerkvm", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "telepresence ex series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.16" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.13" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.0" }, { "model": "edge digital media player", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3400" }, { "model": "4.2.7p11", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.0" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1.7" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.2" }, { "model": "p153", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.5" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.3" }, { "model": "video delivery system recorder", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "small business series wireless access points", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3210" }, { "model": "p7-rc2", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.4" }, { "model": "unified communications manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "jabber guest", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.0(2)" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.37" }, { "model": "p150", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.5" }, { "model": "smartcloud entry appliance fi", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.4" }, { "model": "4.2.5p186", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.8" }, { "model": "network device security assessment", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.1" }, { "model": "prime license manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "asa cx and cisco prime security manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "visual quality experience server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "digital media manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.3" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.4.0" }, { "model": "4.2.5p3", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.2.2" }, { "model": "prime collaboration assurance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "standalone rack server cimc", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.1" }, { "model": "telepresence conductor", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.19" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.1" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.5" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "security access manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1.8" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.37" }, { "model": "prime infrastructure standalone plug and play gateway", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unity express", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.0" }, { "model": "content security appliance updater servers", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ntp", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.3.70" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1.5" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.2" }, { "model": "telepresence video communication server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.2" }, { "model": "p8", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.4" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.8.1.0" }, { "model": "4.2.8p5", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "exalogic infrastructure", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "2.0" }, { "model": "telepresence exchange system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "telepresence sx series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "4.2.8p3", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.8.2.0" }, { "model": "prime access registrar appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "scos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.7.9.0" }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "14.04" }, { "model": "4.2.7p111", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "unified communications manager session management edition", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "meetingplace", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security privileged identity manager fixpack", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "2.0.28" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1.6" }, { "model": "support central", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.3" }, { "model": "ntp", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.6" }, { "model": "small business series wireless access points", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5000" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.2" }, { "model": "virtual security gateway for microsoft hyper-v", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unified computing system e-series blade server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "enterprise linux hpc node eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.2" }, { "model": "clean access manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ntp", "scope": "ne", "trust": 0.3, "vendor": "ntp", "version": "4.3.92" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.2.3" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.11" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.10" }, { "model": "p74", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.5" }, { "model": "hosted collaboration mediation fulfillment", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.0" }, { "model": "p4", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.2" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "expressway series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "common services platform collector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.8.4.0" }, { "model": "prime service catalog virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry appliance fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.26" }, { "model": "4.2.8p2", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.17" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.15" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.12" }, { "model": "lotus protector for mail security", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.80" }, { "model": "prime access registrar", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "wap371 wireless access point", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.2" }, { "model": "onepk all-in-one vm", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "media experience engines", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "intrusion prevention system solutions", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.1" }, { "model": "access registrar appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "p1", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.2" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.14" }, { "model": "edge digital media player", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3000" }, { "model": "ntp", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.3.90" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.8.5.0" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2" }, { "model": "videoscape control suite", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry appliance fi", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.0.4" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1.9" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1.3" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "management heartbeat server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.1" }, { "model": "series ip phones vpn feature", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8800-0" }, { "model": "mediasense", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "telepresence mx series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.0" }, { "model": "lotus protector for mail security", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.8.1.0" }, { "model": "small business series wireless access points", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1210" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.0" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.4" }, { "model": "industrial router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9100" }, { "model": "p6", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.4" }, { "model": "ucs central", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "telepresence profile series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.2" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.8.3.0" }, { "model": "visual quality experience tools server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "video distribution suite for internet streaming", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "4.2.8p1", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1.4" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.03" }, { "model": "4.2.8p7", "scope": "ne", "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "emergency responder", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "4.2.7p366", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "im and presence service", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.20" }, { "model": "connected grid routers", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "smartcloud entry appliance fi", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.0.4" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.4" }, { "model": "security network protection", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "5.3.1.10" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "p4", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.4" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.5" }, { "model": "telepresence integrator c series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "4.2.8p3-rc1", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.2" }, { "model": "show and share", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "sentinel", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security identity governance and intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.1" }, { "model": "p7", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.4" }, { "model": "nac server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "cloud object store", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.3" }, { "model": "ucs director", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ntp", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.3" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.1" }, { "model": "linux x86 64 -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "p5", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.4" }, { "model": "nac appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" } ], "sources": [ { "db": "CERT/CC", "id": "VU#718152" }, { "db": "BID", "id": "88264" }, { "db": "JVNDB", "id": "JVNDB-2016-006649" }, { "db": "CNNVD", "id": "CNNVD-201604-603" }, { "db": "NVD", "id": "CVE-2016-1548" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens reported these vulnerabilities to CISA.", "sources": [ { "db": "CNNVD", "id": "CNNVD-201604-603" } ], "trust": 0.6 }, "cve": "CVE-2016-1548", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2016-1548", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2016-1548", "impactScore": 2.7, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-1548", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2016-1548", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201604-603", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2016-1548", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2016-1548" }, { "db": "JVNDB", "id": "JVNDB-2016-006649" }, { "db": "CNNVD", "id": "CNNVD-201604-603" }, { "db": "NVD", "id": "CVE-2016-1548" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-\u003edst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched. The NTP.org reference implementation of ntpd contains multiple vulnerabilities. NTP is prone to a security-bypass vulnerability. \nAn attacker can exploit this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks. \nVersions prior to NTP 4.2.8p7 and 4.3.x versions prior to 4.3.92 are vulnerable. ==========================================================================\nUbuntu Security Notice USN-3096-1\nOctober 05, 2016\n\nntp vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 16.04 LTS\n- Ubuntu 14.04 LTS\n- Ubuntu 12.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in NTP. (CVE-2015-7973)\n\nMatt Street discovered that NTP incorrectly verified peer associations of\nsymmetric keys. (CVE-2015-7974)\n\nJonathan Gardner discovered that the NTP ntpq utility incorrectly handled\nmemory. An attacker could possibly use this issue to cause ntpq to crash,\nresulting in a denial of service. This issue only affected Ubuntu 16.04\nLTS. (CVE-2015-7975)\n\nJonathan Gardner discovered that the NTP ntpq utility incorrectly handled\ndangerous characters in filenames. An attacker could possibly use this\nissue to overwrite arbitrary files. (CVE-2015-7976)\n\nStephen Gray discovered that NTP incorrectly handled large restrict lists. (CVE-2015-7977, CVE-2015-7978)\n\nAanchal Malhotra discovered that NTP incorrectly handled authenticated\nbroadcast mode. (CVE-2015-7979)\n\nJonathan Gardner discovered that NTP incorrectly handled origin timestamp\nchecks. A remote attacker could use this issue to spoof peer servers. \n(CVE-2015-8138)\n\nJonathan Gardner discovered that the NTP ntpq utility did not properly\nhandle certain incorrect values. An attacker could possibly use this issue\nto cause ntpq to hang, resulting in a denial of service. (CVE-2015-8158)\n\nIt was discovered that the NTP cronjob incorrectly cleaned up the\nstatistics directory. A local attacker could possibly use this to escalate\nprivileges. (CVE-2016-0727)\n\nStephen Gray and Matthew Van Gundy discovered that NTP incorrectly\nvalidated crypto-NAKs. A remote attacker could possibly use this issue to\nprevent clients from synchronizing. A remote attacker could\npossibly use this issue to prevent clients from synchronizing. \n(CVE-2016-1548)\n\nMatthew Van Gundy, Stephen Gray and Loganaden Velvindron discovered that\nNTP incorrectly handled message authentication. (CVE-2016-1550)\n\nYihan Lian discovered that NTP incorrectly handled duplicate IPs on\nunconfig directives. A remote attacker could possibly use this issue to cause a denial\nof service. A remote attacker could possibly use this issue to\ncause a denial of service. A remote attacker could possibly use this issue to\ncause a denial of service. (CVE-2016-4956)\n\nIn the default installation, attackers would be isolated by the NTP\nAppArmor profile. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 16.04 LTS:\n ntp 1:4.2.8p4+dfsg-3ubuntu5.3\n\nUbuntu 14.04 LTS:\n ntp 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10\n\nUbuntu 12.04 LTS:\n ntp 1:4.2.6.p3+dfsg-1ubuntu3.11\n\nIn general, a standard system update will make all the necessary changes. 6.7) - i386, noarch, ppc64, s390x, x86_64\n\n3. \n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201607-15\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: NTP: Multiple vulnerabilities\n Date: July 20, 2016\n Bugs: #563774, #572452, #581528, #584954\n ID: 201607-15\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in NTP, the worst of which\ncould lead to Denial of Service. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-misc/ntp \u003c 4.2.8_p8 \u003e= 4.2.8_p8\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in NTP. Please review the\nCVE identifiers referenced below for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll NTP users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/ntp-4.2.8_p8\"\n\nReferences\n==========\n\n[ 1 ] CVE-2015-7691\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7691\n[ 2 ] CVE-2015-7692\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7692\n[ 3 ] CVE-2015-7701\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7701\n[ 4 ] CVE-2015-7702\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7702\n[ 5 ] CVE-2015-7703\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7703\n[ 6 ] CVE-2015-7704\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7704\n[ 7 ] CVE-2015-7705\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7705\n[ 8 ] CVE-2015-7848\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7848\n[ 9 ] CVE-2015-7849\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7849\n[ 10 ] CVE-2015-7850\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7850\n[ 11 ] CVE-2015-7851\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7851\n[ 12 ] CVE-2015-7852\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7852\n[ 13 ] CVE-2015-7853\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7853\n[ 14 ] CVE-2015-7854\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7854\n[ 15 ] CVE-2015-7855\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7855\n[ 16 ] CVE-2015-7871\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7871\n[ 17 ] CVE-2015-7973\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7973\n[ 18 ] CVE-2015-7974\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7974\n[ 19 ] CVE-2015-7975\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7975\n[ 20 ] CVE-2015-7976\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7976\n[ 21 ] CVE-2015-7977\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7977\n[ 22 ] CVE-2015-7978\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7978\n[ 23 ] CVE-2015-7979\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7979\n[ 24 ] CVE-2015-8138\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8138\n[ 25 ] CVE-2015-8139\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8139\n[ 26 ] CVE-2015-8140\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8140\n[ 27 ] CVE-2015-8158\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8158\n[ 28 ] CVE-2016-1547\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1547\n[ 29 ] CVE-2016-1548\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1548\n[ 30 ] CVE-2016-1549\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1549\n[ 31 ] CVE-2016-1550\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1550\n[ 32 ] CVE-2016-1551\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1551\n[ 33 ] CVE-2016-2516\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2516\n[ 34 ] CVE-2016-2517\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2517\n[ 35 ] CVE-2016-2518\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2518\n[ 36 ] CVE-2016-2519\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2519\n[ 37 ] CVE-2016-4953\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4953\n[ 38 ] CVE-2016-4954\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4954\n[ 39 ] CVE-2016-4955\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4955\n[ 40 ] CVE-2016-4956\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4956\n[ 41 ] CVE-2016-4957\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4957\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201607-15\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2016 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: ntp security update\nAdvisory ID: RHSA-2016:1141-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2016:1141\nIssue date: 2016-05-31\nCVE Names: CVE-2015-7979 CVE-2016-1547 CVE-2016-1548 \n CVE-2016-1550 CVE-2016-2518 \n=====================================================================\n\n1. Summary:\n\nAn update for ntp is now available for Red Hat Enterprise Linux 6 and Red\nHat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, noarch, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64\n\n3. Description:\n\nThe Network Time Protocol (NTP) is used to synchronize a computer\u0027s time\nwith another referenced time source. These packages include the ntpd\nservice which continuously adjusts system time and utilities used to query\nand configure the ntpd service. \n\nSecurity Fix(es):\n\n* It was found that when NTP was configured in broadcast mode, a remote\nattacker could broadcast packets with bad authentication to all clients. \nThe clients, upon receiving the malformed packets, would break the\nassociation with the broadcast server, causing them to become out of sync\nover a longer period of time. (CVE-2015-7979)\n\n* A denial of service flaw was found in the way NTP handled preemptable\nclient associations. A remote attacker could send several crypto NAK\npackets to a victim client, each with a spoofed source address of an\nexisting associated peer, preventing that client from synchronizing its\ntime. (CVE-2016-1547)\n\n* It was found that an ntpd client could be forced to change from basic\nclient/server mode to the interleaved symmetric mode. (CVE-2016-1548)\n\n* A flaw was found in the way NTP\u0027s libntp performed message\nauthentication. An attacker able to observe the timing of the comparison\nfunction used in packet authentication could potentially use this flaw to\nrecover the message digest. (CVE-2016-1550)\n\n* An out-of-bounds access flaw was found in the way ntpd processed certain\npackets. An authenticated attacker could use a crafted packet to create a\npeer association with hmode of 7 and larger, which could potentially\n(although highly unlikely) cause ntpd to crash. (CVE-2016-2518)\n\nThe CVE-2016-1548 issue was discovered by Miroslav Lichvar (Red Hat). \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1300271 - CVE-2015-7979 ntp: off-path denial of service on authenticated broadcast mode\n1331461 - CVE-2016-1547 ntp: crypto-NAK preemptable association denial of service\n1331462 - CVE-2016-1548 ntp: ntpd switching to interleaved mode with spoofed packets\n1331464 - CVE-2016-1550 ntp: libntp message digest disclosure\n1331468 - CVE-2016-2518 ntp: out-of-bounds references on crafted packet\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nntp-4.2.6p5-10.el6.1.src.rpm\n\ni386:\nntp-4.2.6p5-10.el6.1.i686.rpm\nntp-debuginfo-4.2.6p5-10.el6.1.i686.rpm\nntpdate-4.2.6p5-10.el6.1.i686.rpm\n\nx86_64:\nntp-4.2.6p5-10.el6.1.x86_64.rpm\nntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm\nntpdate-4.2.6p5-10.el6.1.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\ni386:\nntp-debuginfo-4.2.6p5-10.el6.1.i686.rpm\nntp-perl-4.2.6p5-10.el6.1.i686.rpm\n\nnoarch:\nntp-doc-4.2.6p5-10.el6.1.noarch.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm\nntp-perl-4.2.6p5-10.el6.1.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nntp-4.2.6p5-10.el6.1.src.rpm\n\nx86_64:\nntp-4.2.6p5-10.el6.1.x86_64.rpm\nntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm\nntpdate-4.2.6p5-10.el6.1.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nnoarch:\nntp-doc-4.2.6p5-10.el6.1.noarch.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm\nntp-perl-4.2.6p5-10.el6.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nntp-4.2.6p5-10.el6.1.src.rpm\n\ni386:\nntp-4.2.6p5-10.el6.1.i686.rpm\nntp-debuginfo-4.2.6p5-10.el6.1.i686.rpm\nntpdate-4.2.6p5-10.el6.1.i686.rpm\n\nppc64:\nntp-4.2.6p5-10.el6.1.ppc64.rpm\nntp-debuginfo-4.2.6p5-10.el6.1.ppc64.rpm\nntpdate-4.2.6p5-10.el6.1.ppc64.rpm\n\ns390x:\nntp-4.2.6p5-10.el6.1.s390x.rpm\nntp-debuginfo-4.2.6p5-10.el6.1.s390x.rpm\nntpdate-4.2.6p5-10.el6.1.s390x.rpm\n\nx86_64:\nntp-4.2.6p5-10.el6.1.x86_64.rpm\nntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm\nntpdate-4.2.6p5-10.el6.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\ni386:\nntp-debuginfo-4.2.6p5-10.el6.1.i686.rpm\nntp-perl-4.2.6p5-10.el6.1.i686.rpm\n\nnoarch:\nntp-doc-4.2.6p5-10.el6.1.noarch.rpm\n\nppc64:\nntp-debuginfo-4.2.6p5-10.el6.1.ppc64.rpm\nntp-perl-4.2.6p5-10.el6.1.ppc64.rpm\n\ns390x:\nntp-debuginfo-4.2.6p5-10.el6.1.s390x.rpm\nntp-perl-4.2.6p5-10.el6.1.s390x.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm\nntp-perl-4.2.6p5-10.el6.1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nntp-4.2.6p5-10.el6.1.src.rpm\n\ni386:\nntp-4.2.6p5-10.el6.1.i686.rpm\nntp-debuginfo-4.2.6p5-10.el6.1.i686.rpm\nntpdate-4.2.6p5-10.el6.1.i686.rpm\n\nx86_64:\nntp-4.2.6p5-10.el6.1.x86_64.rpm\nntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm\nntpdate-4.2.6p5-10.el6.1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\ni386:\nntp-debuginfo-4.2.6p5-10.el6.1.i686.rpm\nntp-perl-4.2.6p5-10.el6.1.i686.rpm\n\nnoarch:\nntp-doc-4.2.6p5-10.el6.1.noarch.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm\nntp-perl-4.2.6p5-10.el6.1.x86_64.rpm\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nntp-4.2.6p5-22.el7_2.2.src.rpm\n\nx86_64:\nntp-4.2.6p5-22.el7_2.2.x86_64.rpm\nntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm\nntpdate-4.2.6p5-22.el7_2.2.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nnoarch:\nntp-doc-4.2.6p5-22.el7_2.2.noarch.rpm\nntp-perl-4.2.6p5-22.el7_2.2.noarch.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm\nsntp-4.2.6p5-22.el7_2.2.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nntp-4.2.6p5-22.el7_2.2.src.rpm\n\nx86_64:\nntp-4.2.6p5-22.el7_2.2.x86_64.rpm\nntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm\nntpdate-4.2.6p5-22.el7_2.2.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nnoarch:\nntp-doc-4.2.6p5-22.el7_2.2.noarch.rpm\nntp-perl-4.2.6p5-22.el7_2.2.noarch.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm\nsntp-4.2.6p5-22.el7_2.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nntp-4.2.6p5-22.el7_2.2.src.rpm\n\nppc64:\nntp-4.2.6p5-22.el7_2.2.ppc64.rpm\nntp-debuginfo-4.2.6p5-22.el7_2.2.ppc64.rpm\nntpdate-4.2.6p5-22.el7_2.2.ppc64.rpm\n\nppc64le:\nntp-4.2.6p5-22.el7_2.2.ppc64le.rpm\nntp-debuginfo-4.2.6p5-22.el7_2.2.ppc64le.rpm\nntpdate-4.2.6p5-22.el7_2.2.ppc64le.rpm\n\ns390x:\nntp-4.2.6p5-22.el7_2.2.s390x.rpm\nntp-debuginfo-4.2.6p5-22.el7_2.2.s390x.rpm\nntpdate-4.2.6p5-22.el7_2.2.s390x.rpm\n\nx86_64:\nntp-4.2.6p5-22.el7_2.2.x86_64.rpm\nntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm\nntpdate-4.2.6p5-22.el7_2.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nnoarch:\nntp-doc-4.2.6p5-22.el7_2.2.noarch.rpm\nntp-perl-4.2.6p5-22.el7_2.2.noarch.rpm\n\nppc64:\nntp-debuginfo-4.2.6p5-22.el7_2.2.ppc64.rpm\nsntp-4.2.6p5-22.el7_2.2.ppc64.rpm\n\nppc64le:\nntp-debuginfo-4.2.6p5-22.el7_2.2.ppc64le.rpm\nsntp-4.2.6p5-22.el7_2.2.ppc64le.rpm\n\ns390x:\nntp-debuginfo-4.2.6p5-22.el7_2.2.s390x.rpm\nsntp-4.2.6p5-22.el7_2.2.s390x.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm\nsntp-4.2.6p5-22.el7_2.2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nntp-4.2.6p5-22.el7_2.2.src.rpm\n\nx86_64:\nntp-4.2.6p5-22.el7_2.2.x86_64.rpm\nntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm\nntpdate-4.2.6p5-22.el7_2.2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nnoarch:\nntp-doc-4.2.6p5-22.el7_2.2.noarch.rpm\nntp-perl-4.2.6p5-22.el7_2.2.noarch.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm\nsntp-4.2.6p5-22.el7_2.2.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2015-7979\nhttps://access.redhat.com/security/cve/CVE-2016-1547\nhttps://access.redhat.com/security/cve/CVE-2016-1548\nhttps://access.redhat.com/security/cve/CVE-2016-1550\nhttps://access.redhat.com/security/cve/CVE-2016-2518\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2016 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFXTUp2XlSAg2UNWIIRAqUmAKC32P98McZUqU1gzWxBbCz0hn0eagCfRtrx\nSULnKXrtTJd5iJ6eQVtDnxA=\n=hETy\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n\n\nHere are the details from the Slackware 14.1 ChangeLog:\n+--------------------------+\npatches/packages/ntp-4.2.8p7-i486-1_slack14.1.txz: Upgraded. \n This release patches several low and medium severity security issues:\n CVE-2016-1551: Refclock impersonation vulnerability, AKA: refclock-peering\n CVE-2016-1549: Sybil vulnerability: ephemeral association attack,\n AKA: ntp-sybil - MITIGATION ONLY\n CVE-2016-2516: Duplicate IPs on unconfig directives will cause an assertion\n botch\n CVE-2016-2517: Remote configuration trustedkey/requestkey values are not\n properly validated\n CVE-2016-2518: Crafted addpeer with hmode \u003e 7 causes array wraparound with\n MATCH_ASSOC\n CVE-2016-2519: ctl_getitem() return value not always checked\n CVE-2016-1547: Validate crypto-NAKs, AKA: nak-dos\n CVE-2016-1548: Interleave-pivot - MITIGATION ONLY\n CVE-2015-7704: KoD fix: peer associations were broken by the fix for\n NtpBug2901, AKA: Symmetric active/passive mode is broken\n CVE-2015-8138: Zero Origin Timestamp Bypass, AKA: Additional KoD Checks\n CVE-2016-1550: Improve NTP security against buffer comparison timing attacks,\n authdecrypt-timing, AKA: authdecrypt-timing\n For more information, see:\n http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1549\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1551\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2517\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2519\n (* Security fix *)\n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated package for Slackware 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/ntp-4.2.8p7-i486-1_slack13.0.txz\n\nUpdated package for Slackware x86_64 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/ntp-4.2.8p7-x86_64-1_slack13.0.txz\n\nUpdated package for Slackware 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/ntp-4.2.8p7-i486-1_slack13.1.txz\n\nUpdated package for Slackware x86_64 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/ntp-4.2.8p7-x86_64-1_slack13.1.txz\n\nUpdated package for Slackware 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/ntp-4.2.8p7-i486-1_slack13.37.txz\n\nUpdated package for Slackware x86_64 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/ntp-4.2.8p7-x86_64-1_slack13.37.txz\n\nUpdated package for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/ntp-4.2.8p7-i486-1_slack14.0.txz\n\nUpdated package for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/ntp-4.2.8p7-x86_64-1_slack14.0.txz\n\nUpdated package for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/ntp-4.2.8p7-i486-1_slack14.1.txz\n\nUpdated package for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/ntp-4.2.8p7-x86_64-1_slack14.1.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/ntp-4.2.8p7-i586-1.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/ntp-4.2.8p7-x86_64-1.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 13.0 package:\n785dc2ef5f80edb28dc781e261c3fe3f ntp-4.2.8p7-i486-1_slack13.0.txz\n\nSlackware x86_64 13.0 package:\n899421096b7b63e6cb269f8b01dfd875 ntp-4.2.8p7-x86_64-1_slack13.0.txz\n\nSlackware 13.1 package:\ndfd34cbd31be3572a2bcae7f59cdfd91 ntp-4.2.8p7-i486-1_slack13.1.txz\n\nSlackware x86_64 13.1 package:\n63c4b31736040e7950361cd0d7081c8b ntp-4.2.8p7-x86_64-1_slack13.1.txz\n\nSlackware 13.37 package:\ne760ae0c6cc3fa933e4d65d6995b0c84 ntp-4.2.8p7-i486-1_slack13.37.txz\n\nSlackware x86_64 13.37 package:\naa448523b27bb4fcccc2f46cf4d72bc5 ntp-4.2.8p7-x86_64-1_slack13.37.txz\n\nSlackware 14.0 package:\n3bc7e54a4164a4f91be996b5cf2e643e ntp-4.2.8p7-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 package:\n0f6ea4dae476709f26f5d0e33378576c ntp-4.2.8p7-x86_64-1_slack14.0.txz\n\nSlackware 14.1 package:\ndbe827ee7ece6ce5ca083cdd5960162c ntp-4.2.8p7-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 package:\n89f3edf183a6a9847d69b8349f98c901 ntp-4.2.8p7-x86_64-1_slack14.1.txz\n\nSlackware -current package:\n4018b86edd15e40e8c5e9f50d907dcff n/ntp-4.2.8p7-i586-1.txz\n\nSlackware x86_64 -current package:\n7dd6b64ba8c9fdaebb7becc1f5c3963d n/ntp-4.2.8p7-x86_64-1.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the package as root:\n# upgradepkg ntp-4.2.8p7-i486-1_slack14.1.txz\n\nThen, restart the NTP daemon:\n\n# sh /etc/rc.d/rc.ntpd restart\n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list: |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message: |\n| |\n| unsubscribe slackware-security |\n| |\n| You will get a confirmation message back containing instructions to |\n| complete the process. Please do not reply to this email address. \n\nCVE-2015-7977 / CVE-2015-7978\n\n Stephen Gray discovered that a NULL pointer dereference and a\n buffer overflow in the handling of \"ntpdc reslist\" commands may\n result in denial of service. \n\nCVE-2016-2518\n\n Yihan Lian discovered that an OOB memory access could potentially\n crash ntpd. \n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 1:4.2.6.p5+dfsg-7+deb8u2. \n\nFor the testing distribution (stretch), these problems have been fixed\nin version 1:4.2.8p7+dfsg-1. \n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 1:4.2.8p7+dfsg-1. \n\nWe recommend that you upgrade your ntp packages", "sources": [ { "db": "NVD", "id": "CVE-2016-1548" }, { "db": "CERT/CC", "id": "VU#718152" }, { "db": "JVNDB", "id": "JVNDB-2016-006649" }, { "db": "BID", "id": "88264" }, { "db": "VULMON", "id": "CVE-2016-1548" }, { "db": "PACKETSTORM", "id": "138984" }, { "db": "PACKETSTORM", "id": "138162" }, { "db": "PACKETSTORM", "id": "137992" }, { "db": "PACKETSTORM", "id": "137244" }, { "db": "PACKETSTORM", "id": "136864" }, { "db": "PACKETSTORM", "id": "138052" } ], "trust": 3.24 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#718152", "trust": 3.6 }, { "db": "NVD", "id": "CVE-2016-1548", "trust": 3.4 }, { "db": "BID", "id": "88264", "trust": 2.0 }, { "db": "PACKETSTORM", "id": "136864", "trust": 1.8 }, { "db": "SECTRACK", "id": "1035705", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-21-103-11", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-21-159-11", "trust": 1.7 }, { "db": "TALOS", "id": "TALOS-2016-0082", "trust": 1.7 }, { "db": "SIEMENS", "id": "SSA-211752", "trust": 1.7 }, { "db": "SIEMENS", "id": "SSA-497656", "trust": 1.7 }, { "db": "JVN", "id": "JVNVU95781418", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU96269392", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU91176422", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2016-006649", "trust": 0.8 }, { "db": "CS-HELP", "id": "SB2021061008", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201604-603", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2016-1548", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "138984", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "138162", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "137992", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "137244", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "138052", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#718152" }, { "db": "VULMON", "id": "CVE-2016-1548" }, { "db": "BID", "id": "88264" }, { "db": "JVNDB", "id": "JVNDB-2016-006649" }, { "db": "PACKETSTORM", "id": "138984" }, { "db": "PACKETSTORM", "id": "138162" }, { "db": "PACKETSTORM", "id": "137992" }, { "db": "PACKETSTORM", "id": "137244" }, { "db": "PACKETSTORM", "id": "136864" }, { "db": "PACKETSTORM", "id": "138052" }, { "db": "CNNVD", "id": "CNNVD-201604-603" }, { "db": "NVD", "id": "CVE-2016-1548" } ] }, "id": "VAR-201701-1137", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.365299625 }, "last_update_date": "2024-11-23T21:19:28.550000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "TALOS-2016-0082", "trust": 0.8, "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "title": "ntpd Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=61286" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2016/04/28/time_for_a_patch_six_vulns_fixed_in_ntp_daemon/" }, { "title": "Red Hat: CVE-2016-1548", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2016-1548" }, { "title": "Amazon Linux AMI: ALAS-2016-708", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2016-708" }, { "title": "Ubuntu Security Notice: ntp vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3096-1" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=e70fe4cd19746222a97e5da53d3d2b2a" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=85311fa037162a48cd67fd63f52a6478" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - April 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=976a4da35d55283870dbb31b88a6c655" }, { "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - April 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=83bbd91f8369c8f064e6d68dac68400f" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - July 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=3a04485ebb79f7fbc2472bf9af5ce489" }, { "title": "satellite-host-cve", "trust": 0.1, "url": "https://github.com/RedHatSatellite/satellite-host-cve " } ], "sources": [ { "db": "VULMON", "id": "CVE-2016-1548" }, { "db": "JVNDB", "id": "JVNDB-2016-006649" }, { "db": "CNNVD", "id": "CNNVD-201604-603" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-19", "trust": 1.0 }, { "problemtype": "Data processing (CWE-19) [NVD Evaluation ]", "trust": 0.8 }, { "problemtype": " Avoid authentication by spoofing (CWE-290) [IPA Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-006649" }, { "db": "NVD", "id": "CVE-2016-1548" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "https://www.kb.cert.org/vuls/id/718152" }, { "trust": 2.8, "url": "https://www.debian.org/security/2016/dsa-3629" }, { "trust": 2.3, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11" }, { "trust": 2.3, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" }, { "trust": 2.1, "url": "https://access.redhat.com/errata/rhsa-2016:1141" }, { "trust": 2.0, "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "trust": 2.0, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160428-ntpd" }, { "trust": 1.8, "url": "https://security.gentoo.org/glsa/201607-15" }, { "trust": 1.8, "url": "http://rhn.redhat.com/errata/rhsa-2016-1552.html" }, { "trust": 1.8, "url": "http://www.ubuntu.com/usn/usn-3096-1" }, { "trust": 1.7, "url": "http://www.talosintelligence.com/reports/talos-2016-0082/" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/88264" }, { "trust": 1.7, "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1035705" }, { "trust": 1.7, "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "trust": 1.7, "url": "https://security.freebsd.org/advisories/freebsd-sa-16:16.ntp.asc" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "trust": 1.7, "url": "http://packetstormsecurity.com/files/136864/slackware-security-advisory-ntp-updates.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" }, { "trust": 1.7, "url": "http://www.securityfocus.com/archive/1/538233/100/0/threaded" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" }, { "trust": 1.7, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-may/184669.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" }, { "trust": 1.7, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-may/183647.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" }, { "trust": 1.7, "url": "http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded" }, { "trust": 1.6, "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19" }, { "trust": 1.1, "url": "https://www.talosintelligence.com/vulnerability_reports/talos-2016-0082" }, { "trust": 0.8, "url": "http://support.ntp.org/bin/view/main/securitynotice#april_2016_ntp_4_2_8p7_security" }, { "trust": 0.8, "url": "http://support.ntp.org/bin/view/main/securitynotice#january_2016_ntp_4_2_8p6_securit" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu91176422/" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu96269392/index.html" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu95781418/index.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1548" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1547" }, { "trust": 0.6, "url": "https://talosintelligence.com/vulnerability_reports/talos-2016-0082" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021061008" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1548" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7979" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1550" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2518" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8138" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2016-1548" }, { "trust": 0.3, "url": "http://www.ntp.org/" }, { "trust": 0.3, "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1023885" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1024073" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1024157" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8n1021521" }, { "trust": 0.3, "url": "http://support.ntp.org/bin/view/main/ntpbug2978 " }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21983803" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21985122" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21986956" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21988706" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21989542" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7978" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2516" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7974" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7977" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8158" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7973" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7975" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7976" }, { "trust": 0.2, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2015-7979" }, { "trust": 0.2, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2016-1547" }, { "trust": 0.2, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2016-1550" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2016-2518" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7704" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/19.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/3096-1/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4956" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0727" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4954" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/ntp/1:4.2.6.p5+dfsg-3ubuntu2.14.04.10" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4955" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/ntp/1:4.2.6.p3+dfsg-1ubuntu3.11" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/ntp/1:4.2.8p4+dfsg-3ubuntu5.3" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7871" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7702" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7705" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1549" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7702" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7849" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7852" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7978" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8140" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7855" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7852" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1551" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2516" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7975" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7848" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8139" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8158" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4954" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4956" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7973" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7853" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7701" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7704" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8140" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7691" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8139" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4957" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7703" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7855" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4955" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7849" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7854" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7703" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7705" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2517" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1548" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7691" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1547" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7854" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7853" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2519" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2518" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7851" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7692" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7871" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7977" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7848" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1550" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7850" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7850" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7701" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7692" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8138" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7979" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7974" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7851" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4953" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7976" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2516" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7704" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1551" }, { "trust": 0.1, "url": "http://slackware.com" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2519" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2517" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2519" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1547" }, { "trust": 0.1, "url": "http://slackware.com/gpg-key" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8138" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2518" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1549" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1551" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1550" }, { "trust": 0.1, "url": "http://support.ntp.org/bin/view/main/securitynotice#recent_vulnerabilities" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2517" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1548" }, { "trust": 0.1, "url": "http://osuosl.org)" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1549" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://www.debian.org/security/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#718152" }, { "db": "VULMON", "id": "CVE-2016-1548" }, { "db": "BID", "id": "88264" }, { "db": "JVNDB", "id": "JVNDB-2016-006649" }, { "db": "PACKETSTORM", "id": "138984" }, { "db": "PACKETSTORM", "id": "138162" }, { "db": "PACKETSTORM", "id": "137992" }, { "db": "PACKETSTORM", "id": "137244" }, { "db": "PACKETSTORM", "id": "136864" }, { "db": "PACKETSTORM", "id": "138052" }, { "db": "CNNVD", "id": "CNNVD-201604-603" }, { "db": "NVD", "id": "CVE-2016-1548" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#718152" }, { "db": "VULMON", "id": "CVE-2016-1548" }, { "db": "BID", "id": "88264" }, { "db": "JVNDB", "id": "JVNDB-2016-006649" }, { "db": "PACKETSTORM", "id": "138984" }, { "db": "PACKETSTORM", "id": "138162" }, { "db": "PACKETSTORM", "id": "137992" }, { "db": "PACKETSTORM", "id": "137244" }, { "db": "PACKETSTORM", "id": "136864" }, { "db": "PACKETSTORM", "id": "138052" }, { "db": "CNNVD", "id": "CNNVD-201604-603" }, { "db": "NVD", "id": "CVE-2016-1548" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-04-27T00:00:00", "db": "CERT/CC", "id": "VU#718152" }, { "date": "2017-01-06T00:00:00", "db": "VULMON", "id": "CVE-2016-1548" }, { "date": "2016-04-26T00:00:00", "db": "BID", "id": "88264" }, { "date": "2017-01-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-006649" }, { "date": "2016-10-05T22:33:00", "db": "PACKETSTORM", "id": "138984" }, { "date": "2016-08-03T18:16:52", "db": "PACKETSTORM", "id": "138162" }, { "date": "2016-07-21T15:56:23", "db": "PACKETSTORM", "id": "137992" }, { "date": "2016-05-31T13:33:49", "db": "PACKETSTORM", "id": "137244" }, { "date": "2016-05-02T21:38:58", "db": "PACKETSTORM", "id": "136864" }, { "date": "2016-07-26T19:19:00", "db": "PACKETSTORM", "id": "138052" }, { "date": "2016-04-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201604-603" }, { "date": "2017-01-06T21:59:00.353000", "db": "NVD", "id": "CVE-2016-1548" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-04-28T00:00:00", "db": "CERT/CC", "id": "VU#718152" }, { "date": "2021-06-10T00:00:00", "db": "VULMON", "id": "CVE-2016-1548" }, { "date": "2016-11-24T01:07:00", "db": "BID", "id": "88264" }, { "date": "2021-06-10T09:01:00", "db": "JVNDB", "id": "JVNDB-2016-006649" }, { "date": "2021-11-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201604-603" }, { "date": "2024-11-21T02:46:37.280000", "db": "NVD", "id": "CVE-2016-1548" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "138984" }, { "db": "PACKETSTORM", "id": "138162" }, { "db": "PACKETSTORM", "id": "137244" }, { "db": "CNNVD", "id": "CNNVD-201604-603" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "NTP.org ntpd contains multiple vulnerabilities", "sources": [ { "db": "CERT/CC", "id": "VU#718152" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201604-603" } ], "trust": 0.6 } }
ghsa-fp4r-m88r-wmm8
Vulnerability from github
An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer->dst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.
{ "affected": [], "aliases": [ "CVE-2016-1548" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-01-06T21:59:00Z", "severity": "HIGH" }, "details": "An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-\u003edst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.", "id": "GHSA-fp4r-m88r-wmm8", "modified": "2022-05-13T01:05:09Z", "published": "2022-05-13T01:05:09Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1548" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2016:1141" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf" }, { "type": "WEB", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201607-15" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20171004-0002" }, { "type": "WEB", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11" }, { "type": "WEB", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" }, { "type": "WEB", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19" }, { "type": "WEB", "url": "https://www.debian.org/security/2016/dsa-3629" }, { "type": "WEB", "url": "https://www.kb.cert.org/vuls/id/718152" }, { "type": "WEB", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0082" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-1552.html" }, { "type": "WEB", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd" }, { "type": "WEB", "url": "http://www.debian.org/security/2016/dsa-3629" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/538233/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/88264" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1035705" }, { "type": "WEB", "url": "http://www.talosintelligence.com/reports/TALOS-2016-0082" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3096-1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L", "type": "CVSS_V3" } ] }
gsd-2016-1548
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2016-1548", "description": "An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-\u003edst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.", "id": "GSD-2016-1548", "references": [ "https://www.suse.com/security/cve/CVE-2016-1548.html", "https://www.debian.org/security/2016/dsa-3629", "https://access.redhat.com/errata/RHSA-2016:1552", "https://access.redhat.com/errata/RHSA-2016:1141", "https://ubuntu.com/security/CVE-2016-1548", "https://advisories.mageia.org/CVE-2016-1548.html", "https://alas.aws.amazon.com/cve/html/CVE-2016-1548.html", "https://linux.oracle.com/cve/CVE-2016-1548.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-1548" ], "details": "An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-\u003edst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.", "id": "GSD-2016-1548", "modified": "2023-12-13T01:21:24.680132Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2016-1548", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "NTP", "version": { "version_data": [ { "version_value": "4.2.8p4" } ] } } ] }, "vendor_name": "NTP Project" }, { "product": { "product_data": [ { "product_name": "NTPSec", "version": { "version_data": [ { "version_value": "aa48d001683e5b791a743ec9c575aaf7d867a2b0c" } ] } } ] }, "vendor_name": "NTPsec Project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-\u003edst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "unspecified" } ] } ] }, "references": { "reference_data": [ { "name": "USN-3096-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3096-1" }, { "name": "DSA-3629", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3629" }, { "name": "http://www.talosintelligence.com/reports/TALOS-2016-0082/", "refsource": "MISC", "url": "http://www.talosintelligence.com/reports/TALOS-2016-0082/" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "RHSA-2016:1141", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2016:1141" }, { "name": "SUSE-SU-2016:1912", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" }, { "name": "88264", "refsource": "BID", "url": "http://www.securityfocus.com/bid/88264" }, { "name": "VU#718152", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/718152" }, { "name": "RHSA-2016:1552", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1552.html" }, { "name": "1035705", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035705" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "https://security.netapp.com/advisory/ntap-20171004-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "name": "20160428 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: April 2016", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd" }, { "name": "FreeBSD-SA-16:16", "refsource": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc" }, { "name": "SUSE-SU-2016:2094", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" }, { "name": "openSUSE-SU-2016:1423", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" }, { "name": "GLSA-201607-15", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201607-15" }, { "name": "openSUSE-SU-2016:1329", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" }, { "name": "http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html" }, { "name": "SUSE-SU-2016:1471", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" }, { "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0082", "refsource": "MISC", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0082" }, { "name": "FEDORA-2016-5b2eb0bf9c", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html" }, { "name": "SUSE-SU-2016:1291", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" }, { "name": "DSA-3629", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2016/dsa-3629" }, { "name": "20160429 [slackware-security] ntp (SSA:2016-120-01)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/538233/100/0/threaded" }, { "name": "SUSE-SU-2016:1568", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" }, { "name": "20160429 [slackware-security] ntp (SSA:2016-120-01)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded" }, { "name": "SUSE-SU-2016:1278", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" }, { "name": "FEDORA-2016-ed8c6c0426", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2016-1548" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-\u003edst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-19" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.talosintelligence.com/reports/TALOS-2016-0082/", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.talosintelligence.com/reports/TALOS-2016-0082/" }, { "name": "88264", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/88264" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "GLSA-201607-15", "refsource": "GENTOO", "tags": [], "url": "https://security.gentoo.org/glsa/201607-15" }, { "name": "1035705", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1035705" }, { "name": "DSA-3629", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2016/dsa-3629" }, { "name": "https://security.netapp.com/advisory/ntap-20171004-0002/", "refsource": "CONFIRM", "tags": [], "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "name": "FreeBSD-SA-16:16", "refsource": "FREEBSD", "tags": [], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc" }, { "name": "RHSA-2016:1141", "refsource": "REDHAT", "tags": [], "url": "https://access.redhat.com/errata/RHSA-2016:1141" }, { "name": "RHSA-2016:1552", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2016-1552.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf", "refsource": "CONFIRM", "tags": [], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11", "refsource": "MISC", "tags": [], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf", "refsource": "CONFIRM", "tags": [], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "name": "http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html", "refsource": "MISC", "tags": [], "url": "http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html" }, { "name": "SUSE-SU-2016:1568", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" }, { "name": "openSUSE-SU-2016:1329", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" }, { "name": "20160429 [slackware-security] ntp (SSA:2016-120-01)", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/538233/100/0/threaded" }, { "name": "openSUSE-SU-2016:1423", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" }, { "name": "DSA-3629", "refsource": "DEBIAN", "tags": [], "url": "https://www.debian.org/security/2016/dsa-3629" }, { "name": "VU#718152", "refsource": "CERT-VN", "tags": [], "url": "https://www.kb.cert.org/vuls/id/718152" }, { "name": "FEDORA-2016-5b2eb0bf9c", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html" }, { "name": "USN-3096-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-3096-1" }, { "name": "SUSE-SU-2016:1278", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" }, { "name": "SUSE-SU-2016:1291", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" }, { "name": "SUSE-SU-2016:1912", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11", "refsource": "MISC", "tags": [], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" }, { "name": "FEDORA-2016-ed8c6c0426", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html" }, { "name": "SUSE-SU-2016:1471", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" }, { "name": "SUSE-SU-2016:2094", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" }, { "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0082", "refsource": "MISC", "tags": [], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2016-0082" }, { "name": "20160428 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: April 2016", "refsource": "CISCO", "tags": [], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd" }, { "name": "20160429 [slackware-security] ntp (SSA:2016-120-01)", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19", "refsource": "MISC", "tags": [], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 2.7 } }, "lastModifiedDate": "2021-11-17T22:15Z", "publishedDate": "2017-01-06T21:59Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.