Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-2518 (GCVE-0-2016-2518)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T23:32:20.674Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-3096-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3096-1" }, { "name": "DSA-3629", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3629" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug3009" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "RHSA-2016:1141", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2016:1141" }, { "name": "SUSE-SU-2016:1912", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" }, { "name": "VU#718152", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/718152" }, { "name": "RHSA-2016:1552", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1552.html" }, { "name": "1035705", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1035705" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_ntp_4_2_8p7_Security" }, { "name": "20160428 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: April 2016", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd" }, { "name": "FreeBSD-SA-16:16", "tags": [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc" }, { "name": "SUSE-SU-2016:2094", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" }, { "name": "88226", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/88226" }, { "name": "openSUSE-SU-2016:1423", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" }, { "name": "GLSA-201607-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201607-15" }, { "name": "openSUSE-SU-2016:1329", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html" }, { "name": "SUSE-SU-2016:1471", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" }, { "name": "FEDORA-2016-5b2eb0bf9c", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html" }, { "name": "SUSE-SU-2016:1291", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" }, { "name": "DSA-3629", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2016/dsa-3629" }, { "name": "20160429 [slackware-security] ntp (SSA:2016-120-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/538233/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K20804323" }, { "name": "SUSE-SU-2016:1568", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" }, { "name": "20160429 [slackware-security] ntp (SSA:2016-120-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded" }, { "name": "SUSE-SU-2016:1278", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" }, { "name": "FEDORA-2016-ed8c6c0426", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-27T00:00:00", "descriptions": [ { "lang": "en", "value": "The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-10T12:19:12", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-3096-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3096-1" }, { "name": "DSA-3629", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3629" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug3009" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "RHSA-2016:1141", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2016:1141" }, { "name": "SUSE-SU-2016:1912", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" }, { "name": "VU#718152", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/718152" }, { "name": "RHSA-2016:1552", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1552.html" }, { "name": "1035705", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1035705" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_ntp_4_2_8p7_Security" }, { "name": "20160428 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: April 2016", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd" }, { "name": "FreeBSD-SA-16:16", "tags": [ "vendor-advisory", "x_refsource_FREEBSD" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc" }, { "name": "SUSE-SU-2016:2094", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" }, { "name": "88226", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/88226" }, { "name": "openSUSE-SU-2016:1423", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" }, { "name": "GLSA-201607-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201607-15" }, { "name": "openSUSE-SU-2016:1329", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html" }, { "name": "SUSE-SU-2016:1471", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" }, { "name": "FEDORA-2016-5b2eb0bf9c", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html" }, { "name": "SUSE-SU-2016:1291", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" }, { "name": "DSA-3629", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2016/dsa-3629" }, { "name": "20160429 [slackware-security] ntp (SSA:2016-120-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/538233/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K20804323" }, { "name": "SUSE-SU-2016:1568", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" }, { "name": "20160429 [slackware-security] ntp (SSA:2016-120-01)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded" }, { "name": "SUSE-SU-2016:1278", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" }, { "name": "FEDORA-2016-ed8c6c0426", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-2518", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-3096-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3096-1" }, { "name": "DSA-3629", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3629" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "name": "http://support.ntp.org/bin/view/Main/NtpBug3009", "refsource": "CONFIRM", "url": "http://support.ntp.org/bin/view/Main/NtpBug3009" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "RHSA-2016:1141", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2016:1141" }, { "name": "SUSE-SU-2016:1912", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" }, { "name": "VU#718152", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/718152" }, { "name": "RHSA-2016:1552", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1552.html" }, { "name": "1035705", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035705" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "https://security.netapp.com/advisory/ntap-20171004-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "name": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_ntp_4_2_8p7_Security", "refsource": "CONFIRM", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_ntp_4_2_8p7_Security" }, { "name": "20160428 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: April 2016", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd" }, { "name": "FreeBSD-SA-16:16", "refsource": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc" }, { "name": "SUSE-SU-2016:2094", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" }, { "name": "88226", "refsource": "BID", "url": "http://www.securityfocus.com/bid/88226" }, { "name": "openSUSE-SU-2016:1423", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" }, { "name": "GLSA-201607-15", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201607-15" }, { "name": "openSUSE-SU-2016:1329", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" }, { "name": "http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html" }, { "name": "SUSE-SU-2016:1471", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" }, { "name": "FEDORA-2016-5b2eb0bf9c", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html" }, { "name": "SUSE-SU-2016:1291", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" }, { "name": "DSA-3629", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2016/dsa-3629" }, { "name": "20160429 [slackware-security] ntp (SSA:2016-120-01)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/538233/100/0/threaded" }, { "name": "https://support.f5.com/csp/article/K20804323", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K20804323" }, { "name": "SUSE-SU-2016:1568", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" }, { "name": "20160429 [slackware-security] ntp (SSA:2016-120-01)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded" }, { "name": "SUSE-SU-2016:1278", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" }, { "name": "FEDORA-2016-ed8c6c0426", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-2518", "datePublished": "2017-01-30T21:00:00", "dateReserved": "2016-02-20T00:00:00", "dateUpdated": "2024-08-05T23:32:20.674Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-2518\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-01-30T21:59:01.080\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n MATCH_ASSOC en NTP en versiones anteriores 4.2.8p9 y 4.3.x en versiones anteriores a 4.3.92 permite a atacantes remotos provocar una referencia fuera de los l\u00edmites a trav\u00e9s de una solicitud addpeer con un valor hmode grande.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.2.8\",\"matchCriteriaId\":\"CED3C1F7-6FFA-44D1-BC56-2BB1963F3B9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.3.0\",\"versionEndExcluding\":\"4.3.92\",\"matchCriteriaId\":\"2A5D4FE7-07FC-4869-84F2-4FA767490A73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEA51D83-5841-4335-AF07-7A43C118CAAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C855BBD2-2B38-4EFF-9DBE-CA61CCACD0DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"49ADE0C3-F75C-4EC0-8805-56013F0EB92C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8FF625A-EFA3-43D1-8698-4A37AE31A07C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3B99BBD-97FE-4615-905A-A614592226F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7A9AD3A-F030-4331-B52A-518BD963AB8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"C293B8BE-6691-4944-BCD6-25EB98CABC73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEA650F8-2576-494A-A861-61572CA319D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ED21EE8-7CBF-4BC5-BFC3-185D41296238\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C76A0B44-13DE-4173-8D05-DA54F6A71759\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1450241C-2F6D-4122-B33C-D78D065BA403\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"721AFD22-91D3-488E-A5E6-DD84C86E412B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D6ADDB1-2E96-4FF6-AE95-4B06654D38B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"41E44E9F-6383-4E12-AEDC-B653FEA77A48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"466D9A37-2658-4695-9429-0C6BF4A631C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"99774181-5F12-446C-AC2C-DB1C52295EED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"4427EE6D-3F79-4FF5-B3EC-EE6BD01562CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"99C71C00-7222-483B-AEFB-159337BD3C92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*\",\"matchCriteriaId\":\"75A9AA28-1B20-44BB-815C-7294A53E910E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C213794-111D-41F3-916C-AD97F731D600\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*\",\"matchCriteriaId\":\"50811A7B-0379-4437-8737-B4C1ACBC9EFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*\",\"matchCriteriaId\":\"F12E4CF5-536C-416B-AD8D-6AE7CBE22C71\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FE996B1-6951-4F85-AA58-B99A379D2163\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:data_ontap:-:*:*:*:*:7-mode:*:*\",\"matchCriteriaId\":\"6C2ACC32-5147-4EA5-95BE-B6B4EAB3D82B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DCBCC5D-C396-47A8-ADF4-D3A2C4377FB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"212E1878-1B9A-4CB4-A1CE-EAD60B867161\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_unified_manager_for_clustered_data_ontap:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"392D82A3-21BC-4CE1-A0AC-62A90468F0A5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_user_data_repository:10.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6D2C3F5-73E2-4988-9416-940C3C09F25F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_user_data_repository:10.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0473C6C9-B0C5-43F0-AC8C-C0DAD30DACF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_user_data_repository:12.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E94636C-58E3-4B5C-9B18-E5129F6B4A11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7B037A8-72A6-4DFF-94B2-D688A5F6F876\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"44B8FEDF-6CB0-46E9-9AD7-4445B001C158\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C8D871B-AEA1-4407-AEE3-47EC782250FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99A687E-EAE6-417E-A88E-D0082BC194CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B353CE99-D57C-465B-AAB0-73EF581127D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44B067C7-735E-43C9-9188-7E1522A02491\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8442C20-41F9-47FD-9A12-E724D3A31FD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF77CDCF-B9C9-427D-B2BF-36650FB2148C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21690BAC-2129-4A33-9B48-1F3BF30072A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6755B6AD-0422-467B-8115-34A60B1D1A40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76AA310-FEC7-497F-AF04-C3EC1E76C4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17F256A9-D3B9-4C72-B013-4EFD878BFEA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"A308448F-7FAD-4CAA-B204-94979A0055EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D942069-86FD-4777-B144-27F68845510F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p10:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BCB79FA-CF26-4DA9-BE6B-DB38F4BD76DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p12:*:*:*:*:*:*\",\"matchCriteriaId\":\"6937683B-ADC8-452E-BCD7-34ED8656D75E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p13:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B50A898-C510-4582-8931-2820D2FFB646\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p16:*:*:*:*:*:*\",\"matchCriteriaId\":\"5016E4BB-D905-49BF-8B23-40DD9F9BC133\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p19:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4009691-42D4-4E04-BA72-EAC9E30C30E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC531D8E-31B3-48B1-8B79-85B9FB67CF0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p20:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B161FA9-E1A8-407B-80A9-9F57DF4E6932\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p21:*:*:*:*:*:*\",\"matchCriteriaId\":\"C608B9D9-28DD-4470-A5A2-96B030E8EA0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p22:*:*:*:*:*:*\",\"matchCriteriaId\":\"50702FA4-624E-4C47-B672-8479ED7EB00C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p23:*:*:*:*:*:*\",\"matchCriteriaId\":\"A05DE064-17DC-4BC3-BFA7-1FF31324BB5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p24:*:*:*:*:*:*\",\"matchCriteriaId\":\"3785D821-D809-4948-92E0-CD6F93D06D56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p25:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F309C4D-DBE9-4FDC-9F71-670FE84E8859\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p28:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6DF73AA-4270-46C1-BD19-EE0EAE39B6EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9D919A6-BBEC-416C-8FC0-5CA7B0191E82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p30:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC7FC9A7-46A4-4BEC-AD3D-4E986BBB4B1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p31:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C1380CA-757C-442D-A15E-7C1EEF309BC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p32:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4E26747-28E7-46C6-B9D2-949E7D2B9076\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p33:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D16FE35-E17F-4520-B2AA-916F586DE052\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p34:*:*:*:*:*:*\",\"matchCriteriaId\":\"02A6E6C3-1DBF-41C5-8377-A3058AF1A1A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p35:*:*:*:*:*:*\",\"matchCriteriaId\":\"168BEEE1-3401-4831-B32A-19874B1C185E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p36:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE660FBA-AD88-485E-B77B-94513E9CC660\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p38:*:*:*:*:*:*\",\"matchCriteriaId\":\"04E25F11-56B2-4F49-913A-57FC58EBD87E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p39:*:*:*:*:*:*\",\"matchCriteriaId\":\"B144DAC7-1B42-4DC2-AE46-6D3AD3296A43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p5:*:*:*:*:*:*\",\"matchCriteriaId\":\"22A2F317-2F1A-4D3F-8E31-B5ABFCEE2AAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p6:*:*:*:*:*:*\",\"matchCriteriaId\":\"179468E8-0FB7-4E1A-9002-AFC8753027AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p7:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF8563F3-DD91-4272-B72D-08F66E2E44C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p8:*:*:*:*:*:*\",\"matchCriteriaId\":\"642BCA8F-6432-43D2-9E74-565CC71A9DD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:9.3:p9:*:*:*:*:*:*\",\"matchCriteriaId\":\"09003BFB-72FB-4F89-B62C-4A2505E60630\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"794DB6C2-514F-4353-AC31-025D53FFC3FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.1:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"55448583-DD8E-44FA-9033-CEB8E63FC2C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.1:p10:*:*:*:*:*:*\",\"matchCriteriaId\":\"A238C1FE-D4D3-4EEC-ACBE-341B112123EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.1:p12:*:*:*:*:*:*\",\"matchCriteriaId\":\"BABAD599-782F-4BFE-9EE2-0668ECAAC349\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.1:p15:*:*:*:*:*:*\",\"matchCriteriaId\":\"C263C188-EA00-4110-B9A5-16C0CD0F1DE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.1:p16:*:*:*:*:*:*\",\"matchCriteriaId\":\"75F93217-BCD4-4AD4-9621-49C83BA3FFD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.1:p17:*:*:*:*:*:*\",\"matchCriteriaId\":\"1860A2E7-8E58-4082-9C71-E4F383244953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.1:p18:*:*:*:*:*:*\",\"matchCriteriaId\":\"B07FABAF-00CF-4284-AAC2-F3D6DA3D3841\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.1:p19:*:*:*:*:*:*\",\"matchCriteriaId\":\"87440763-A4AF-44E9-AB26-155313A64269\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.1:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F2A6E84-E37B-4E21-BBD9-FDB878D53D58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.1:p22:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D5B97BE-4A7F-4482-8A7F-A7DB5314CEA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.1:p24:*:*:*:*:*:*\",\"matchCriteriaId\":\"256FDB00-0427-4B72-B9FA-1FE4AD56EC28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.1:p25:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EC0C4BA-089F-44B1-A49B-2CDDEC86997B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.1:p26:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7713F76-A9C7-498B-BEEC-B022D13268A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.1:p27:*:*:*:*:*:*\",\"matchCriteriaId\":\"E51647B0-B346-4FCB-97BE-22D43D002B17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.1:p28:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD84262A-7EBA-4E69-84C0-401D2FF33145\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.1:p29:*:*:*:*:*:*\",\"matchCriteriaId\":\"40325D25-ECE7-486E-B654-EAEA69E3D97D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.1:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5F7A00A-5A6B-46FA-8527-14917C50555A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.1:p30:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBD1A05A-5BBF-4C18-A5E0-E3A938D0D44C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.1:p31:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A8EDDD7-9BE0-4C11-B3E2-6BC63984DA23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.1:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"466EA7B2-FBAF-4325-AD99-F5F4B0E5C0AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.1:p5:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAD3F82B-E13C-40CE-BF65-4DA204FCDE93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.1:p6:*:*:*:*:*:*\",\"matchCriteriaId\":\"23E2935E-7159-45A2-9164-978453F24BDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.1:p7:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B7F75CF-F808-4BD6-9A46-AA5C1989F740\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.1:p8:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EC40899-2775-45B9-96C1-8A9E7FAB7A64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.1:p9:*:*:*:*:*:*\",\"matchCriteriaId\":\"A22BC7A2-BA8D-4C1D-A51A-7DF7EDEDDCC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1C1DA92-2184-4FB0-8392-AF80E7D6EB2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.2:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C59FCA1F-C2F9-4E11-A457-7979C94ECD3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.2:p10:*:*:*:*:*:*\",\"matchCriteriaId\":\"13BA0876-9EFB-474E-83BB-9A53F38ADD4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.2:p11:*:*:*:*:*:*\",\"matchCriteriaId\":\"B757D006-B0C5-4992-A1D7-2EB26C9A36D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.2:p12:*:*:*:*:*:*\",\"matchCriteriaId\":\"D07D5215-F475-42BA-B9B0-395628646C41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.2:p13:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0EED80F-53F4-46AA-B76E-FBF158D16544\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.2:p14:*:*:*:*:*:*\",\"matchCriteriaId\":\"375EAFDB-9E71-4EE8-9BDA-77FF831F2E06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.2:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"041C28B8-8EA6-461D-B6CB-13E3B9FF8411\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.2:p5:*:*:*:*:*:*\",\"matchCriteriaId\":\"91362F1A-CB09-4505-A724-332C743D9624\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.2:p7:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7F738CA-C3F4-4A30-9FF6-F0BD1DC1CC84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.2:p8:*:*:*:*:*:*\",\"matchCriteriaId\":\"44685E95-3139-4A82-9A8B-EB5379DF0558\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.2:p9:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F92482C-F8B9-47A7-B5F1-ACBAC2A91646\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:10.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"E30CCEF8-E86A-482F-A77B-175F106D354E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_net_cp_443-1_opc_ua_firmware:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22EFD09A-3D77-47B0-93FB-50F6C13A2F9A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_net_cp_443-1_opc_ua:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F488810-73E3-4475-975A-C2FCA037E78B\"}]}]}],\"references\":[{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1552.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://support.ntp.org/bin/view/Main/NtpBug3009\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_ntp_4_2_8p7_Security\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2016/dsa-3629\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/538233/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/88226\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1035705\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3096-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2016:1141\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201607-15\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20171004-0002/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K20804323\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.debian.org/security/2016/dsa-3629\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.kb.cert.org/vuls/id/718152\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1552.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://support.ntp.org/bin/view/Main/NtpBug3009\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_ntp_4_2_8p7_Security\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2016/dsa-3629\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/538233/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/88226\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1035705\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3096-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2016:1141\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201607-15\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20171004-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K20804323\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2016/dsa-3629\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.kb.cert.org/vuls/id/718152\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}" } }
var-201701-0399
Vulnerability from variot
The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value. The NTP.org reference implementation of ntpd contains multiple vulnerabilities. NTP is prone to a denial-of-service vulnerability. An attacker can exploit this issue to cause a denial-of-service condition, denying service to legitimate users. Versions prior to NTP 4.2.8p7 and 4.3.x versions prior to 4.3.92 are vulnerable. ========================================================================== Ubuntu Security Notice USN-3096-1 October 05, 2016
ntp vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in NTP. A remote attacker could use this issue to perform a replay attack. (CVE-2015-7973)
Matt Street discovered that NTP incorrectly verified peer associations of symmetric keys. A remote attacker could use this issue to perform an impersonation attack. (CVE-2015-7974)
Jonathan Gardner discovered that the NTP ntpq utility incorrectly handled memory. This issue only affected Ubuntu 16.04 LTS. (CVE-2015-7975)
Jonathan Gardner discovered that the NTP ntpq utility incorrectly handled dangerous characters in filenames. An attacker could possibly use this issue to overwrite arbitrary files. (CVE-2015-7976)
Stephen Gray discovered that NTP incorrectly handled large restrict lists. (CVE-2015-7977, CVE-2015-7978)
Aanchal Malhotra discovered that NTP incorrectly handled authenticated broadcast mode. (CVE-2015-7979)
Jonathan Gardner discovered that NTP incorrectly handled origin timestamp checks. A remote attacker could use this issue to spoof peer servers. (CVE-2015-8138)
Jonathan Gardner discovered that the NTP ntpq utility did not properly handle certain incorrect values. (CVE-2015-8158)
It was discovered that the NTP cronjob incorrectly cleaned up the statistics directory. A local attacker could possibly use this to escalate privileges. (CVE-2016-0727)
Stephen Gray and Matthew Van Gundy discovered that NTP incorrectly validated crypto-NAKs. A remote attacker could possibly use this issue to prevent clients from synchronizing. A remote attacker could possibly use this issue to prevent clients from synchronizing. (CVE-2016-1548)
Matthew Van Gundy, Stephen Gray and Loganaden Velvindron discovered that NTP incorrectly handled message authentication. (CVE-2016-1550)
Yihan Lian discovered that NTP incorrectly handled duplicate IPs on unconfig directives. (CVE-2016-4956)
In the default installation, attackers would be isolated by the NTP AppArmor profile.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04 LTS: ntp 1:4.2.8p4+dfsg-3ubuntu5.3
Ubuntu 14.04 LTS: ntp 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10
Ubuntu 12.04 LTS: ntp 1:4.2.6.p3+dfsg-1ubuntu3.11
In general, a standard system update will make all the necessary changes. 6.7) - i386, noarch, ppc64, s390x, x86_64
Gentoo Linux Security Advisory GLSA 201607-15
https://security.gentoo.org/
Severity: Normal Title: NTP: Multiple vulnerabilities Date: July 20, 2016 Bugs: #563774, #572452, #581528, #584954 ID: 201607-15
Synopsis
Multiple vulnerabilities have been found in NTP, the worst of which could lead to Denial of Service.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/ntp < 4.2.8_p8 >= 4.2.8_p8
Description
Multiple vulnerabilities have been discovered in NTP. Please review the CVE identifiers referenced below for details.
Workaround
There is no known workaround at this time.
Resolution
All NTP users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/ntp-4.2.8_p8"
References
[ 1 ] CVE-2015-7691 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7691 [ 2 ] CVE-2015-7692 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7692 [ 3 ] CVE-2015-7701 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7701 [ 4 ] CVE-2015-7702 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7702 [ 5 ] CVE-2015-7703 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7703 [ 6 ] CVE-2015-7704 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7704 [ 7 ] CVE-2015-7705 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7705 [ 8 ] CVE-2015-7848 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7848 [ 9 ] CVE-2015-7849 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7849 [ 10 ] CVE-2015-7850 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7850 [ 11 ] CVE-2015-7851 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7851 [ 12 ] CVE-2015-7852 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7852 [ 13 ] CVE-2015-7853 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7853 [ 14 ] CVE-2015-7854 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7854 [ 15 ] CVE-2015-7855 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7855 [ 16 ] CVE-2015-7871 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7871 [ 17 ] CVE-2015-7973 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7973 [ 18 ] CVE-2015-7974 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7974 [ 19 ] CVE-2015-7975 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7975 [ 20 ] CVE-2015-7976 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7976 [ 21 ] CVE-2015-7977 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7977 [ 22 ] CVE-2015-7978 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7978 [ 23 ] CVE-2015-7979 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7979 [ 24 ] CVE-2015-8138 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8138 [ 25 ] CVE-2015-8139 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8139 [ 26 ] CVE-2015-8140 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8140 [ 27 ] CVE-2015-8158 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8158 [ 28 ] CVE-2016-1547 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1547 [ 29 ] CVE-2016-1548 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1548 [ 30 ] CVE-2016-1549 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1549 [ 31 ] CVE-2016-1550 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1550 [ 32 ] CVE-2016-1551 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1551 [ 33 ] CVE-2016-2516 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2516 [ 34 ] CVE-2016-2517 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2517 [ 35 ] CVE-2016-2518 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2518 [ 36 ] CVE-2016-2519 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2519 [ 37 ] CVE-2016-4953 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4953 [ 38 ] CVE-2016-4954 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4954 [ 39 ] CVE-2016-4955 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4955 [ 40 ] CVE-2016-4956 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4956 [ 41 ] CVE-2016-4957 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4957
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201607-15
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: ntp security update Advisory ID: RHSA-2016:1141-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2016:1141 Issue date: 2016-05-31 CVE Names: CVE-2015-7979 CVE-2016-1547 CVE-2016-1548 CVE-2016-1550 CVE-2016-2518 =====================================================================
- Summary:
An update for ntp is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64
- Description:
The Network Time Protocol (NTP) is used to synchronize a computer's time with another referenced time source. These packages include the ntpd service which continuously adjusts system time and utilities used to query and configure the ntpd service.
Security Fix(es):
-
It was found that when NTP was configured in broadcast mode, a remote attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server, causing them to become out of sync over a longer period of time. (CVE-2015-7979)
-
A denial of service flaw was found in the way NTP handled preemptable client associations. A remote attacker could send several crypto NAK packets to a victim client, each with a spoofed source address of an existing associated peer, preventing that client from synchronizing its time. (CVE-2016-1547)
-
It was found that an ntpd client could be forced to change from basic client/server mode to the interleaved symmetric mode. A remote attacker could use a spoofed packet that, when processed by an ntpd client, would cause that client to reject all future legitimate server responses, effectively disabling time synchronization on that client. (CVE-2016-1548)
-
A flaw was found in the way NTP's libntp performed message authentication. An attacker able to observe the timing of the comparison function used in packet authentication could potentially use this flaw to recover the message digest. (CVE-2016-1550)
-
An out-of-bounds access flaw was found in the way ntpd processed certain packets. An authenticated attacker could use a crafted packet to create a peer association with hmode of 7 and larger, which could potentially (although highly unlikely) cause ntpd to crash. (CVE-2016-2518)
The CVE-2016-1548 issue was discovered by Miroslav Lichvar (Red Hat).
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1300271 - CVE-2015-7979 ntp: off-path denial of service on authenticated broadcast mode 1331461 - CVE-2016-1547 ntp: crypto-NAK preemptable association denial of service 1331462 - CVE-2016-1548 ntp: ntpd switching to interleaved mode with spoofed packets 1331464 - CVE-2016-1550 ntp: libntp message digest disclosure 1331468 - CVE-2016-2518 ntp: out-of-bounds references on crafted packet
- Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source: ntp-4.2.6p5-10.el6.1.src.rpm
i386: ntp-4.2.6p5-10.el6.1.i686.rpm ntp-debuginfo-4.2.6p5-10.el6.1.i686.rpm ntpdate-4.2.6p5-10.el6.1.i686.rpm
x86_64: ntp-4.2.6p5-10.el6.1.x86_64.rpm ntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm ntpdate-4.2.6p5-10.el6.1.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
i386: ntp-debuginfo-4.2.6p5-10.el6.1.i686.rpm ntp-perl-4.2.6p5-10.el6.1.i686.rpm
noarch: ntp-doc-4.2.6p5-10.el6.1.noarch.rpm
x86_64: ntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm ntp-perl-4.2.6p5-10.el6.1.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: ntp-4.2.6p5-10.el6.1.src.rpm
x86_64: ntp-4.2.6p5-10.el6.1.x86_64.rpm ntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm ntpdate-4.2.6p5-10.el6.1.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
noarch: ntp-doc-4.2.6p5-10.el6.1.noarch.rpm
x86_64: ntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm ntp-perl-4.2.6p5-10.el6.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: ntp-4.2.6p5-10.el6.1.src.rpm
i386: ntp-4.2.6p5-10.el6.1.i686.rpm ntp-debuginfo-4.2.6p5-10.el6.1.i686.rpm ntpdate-4.2.6p5-10.el6.1.i686.rpm
ppc64: ntp-4.2.6p5-10.el6.1.ppc64.rpm ntp-debuginfo-4.2.6p5-10.el6.1.ppc64.rpm ntpdate-4.2.6p5-10.el6.1.ppc64.rpm
s390x: ntp-4.2.6p5-10.el6.1.s390x.rpm ntp-debuginfo-4.2.6p5-10.el6.1.s390x.rpm ntpdate-4.2.6p5-10.el6.1.s390x.rpm
x86_64: ntp-4.2.6p5-10.el6.1.x86_64.rpm ntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm ntpdate-4.2.6p5-10.el6.1.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
i386: ntp-debuginfo-4.2.6p5-10.el6.1.i686.rpm ntp-perl-4.2.6p5-10.el6.1.i686.rpm
noarch: ntp-doc-4.2.6p5-10.el6.1.noarch.rpm
ppc64: ntp-debuginfo-4.2.6p5-10.el6.1.ppc64.rpm ntp-perl-4.2.6p5-10.el6.1.ppc64.rpm
s390x: ntp-debuginfo-4.2.6p5-10.el6.1.s390x.rpm ntp-perl-4.2.6p5-10.el6.1.s390x.rpm
x86_64: ntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm ntp-perl-4.2.6p5-10.el6.1.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: ntp-4.2.6p5-10.el6.1.src.rpm
i386: ntp-4.2.6p5-10.el6.1.i686.rpm ntp-debuginfo-4.2.6p5-10.el6.1.i686.rpm ntpdate-4.2.6p5-10.el6.1.i686.rpm
x86_64: ntp-4.2.6p5-10.el6.1.x86_64.rpm ntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm ntpdate-4.2.6p5-10.el6.1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
i386: ntp-debuginfo-4.2.6p5-10.el6.1.i686.rpm ntp-perl-4.2.6p5-10.el6.1.i686.rpm
noarch: ntp-doc-4.2.6p5-10.el6.1.noarch.rpm
x86_64: ntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm ntp-perl-4.2.6p5-10.el6.1.x86_64.rpm
Red Hat Enterprise Linux Client (v. 7):
Source: ntp-4.2.6p5-22.el7_2.2.src.rpm
x86_64: ntp-4.2.6p5-22.el7_2.2.x86_64.rpm ntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm ntpdate-4.2.6p5-22.el7_2.2.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
noarch: ntp-doc-4.2.6p5-22.el7_2.2.noarch.rpm ntp-perl-4.2.6p5-22.el7_2.2.noarch.rpm
x86_64: ntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm sntp-4.2.6p5-22.el7_2.2.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: ntp-4.2.6p5-22.el7_2.2.src.rpm
x86_64: ntp-4.2.6p5-22.el7_2.2.x86_64.rpm ntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm ntpdate-4.2.6p5-22.el7_2.2.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
noarch: ntp-doc-4.2.6p5-22.el7_2.2.noarch.rpm ntp-perl-4.2.6p5-22.el7_2.2.noarch.rpm
x86_64: ntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm sntp-4.2.6p5-22.el7_2.2.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: ntp-4.2.6p5-22.el7_2.2.src.rpm
ppc64: ntp-4.2.6p5-22.el7_2.2.ppc64.rpm ntp-debuginfo-4.2.6p5-22.el7_2.2.ppc64.rpm ntpdate-4.2.6p5-22.el7_2.2.ppc64.rpm
ppc64le: ntp-4.2.6p5-22.el7_2.2.ppc64le.rpm ntp-debuginfo-4.2.6p5-22.el7_2.2.ppc64le.rpm ntpdate-4.2.6p5-22.el7_2.2.ppc64le.rpm
s390x: ntp-4.2.6p5-22.el7_2.2.s390x.rpm ntp-debuginfo-4.2.6p5-22.el7_2.2.s390x.rpm ntpdate-4.2.6p5-22.el7_2.2.s390x.rpm
x86_64: ntp-4.2.6p5-22.el7_2.2.x86_64.rpm ntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm ntpdate-4.2.6p5-22.el7_2.2.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
noarch: ntp-doc-4.2.6p5-22.el7_2.2.noarch.rpm ntp-perl-4.2.6p5-22.el7_2.2.noarch.rpm
ppc64: ntp-debuginfo-4.2.6p5-22.el7_2.2.ppc64.rpm sntp-4.2.6p5-22.el7_2.2.ppc64.rpm
ppc64le: ntp-debuginfo-4.2.6p5-22.el7_2.2.ppc64le.rpm sntp-4.2.6p5-22.el7_2.2.ppc64le.rpm
s390x: ntp-debuginfo-4.2.6p5-22.el7_2.2.s390x.rpm sntp-4.2.6p5-22.el7_2.2.s390x.rpm
x86_64: ntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm sntp-4.2.6p5-22.el7_2.2.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: ntp-4.2.6p5-22.el7_2.2.src.rpm
x86_64: ntp-4.2.6p5-22.el7_2.2.x86_64.rpm ntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm ntpdate-4.2.6p5-22.el7_2.2.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
noarch: ntp-doc-4.2.6p5-22.el7_2.2.noarch.rpm ntp-perl-4.2.6p5-22.el7_2.2.noarch.rpm
x86_64: ntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm sntp-4.2.6p5-22.el7_2.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2015-7979 https://access.redhat.com/security/cve/CVE-2016-1547 https://access.redhat.com/security/cve/CVE-2016-1548 https://access.redhat.com/security/cve/CVE-2016-1550 https://access.redhat.com/security/cve/CVE-2016-2518 https://access.redhat.com/security/updates/classification/#moderate
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFXTUp2XlSAg2UNWIIRAqUmAKC32P98McZUqU1gzWxBbCz0hn0eagCfRtrx SULnKXrtTJd5iJ6eQVtDnxA= =hETy -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce .
Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/ntp-4.2.8p7-i486-1_slack14.1.txz: Upgraded. This release patches several low and medium severity security issues: CVE-2016-1551: Refclock impersonation vulnerability, AKA: refclock-peering CVE-2016-1549: Sybil vulnerability: ephemeral association attack, AKA: ntp-sybil - MITIGATION ONLY CVE-2016-2516: Duplicate IPs on unconfig directives will cause an assertion botch CVE-2016-2517: Remote configuration trustedkey/requestkey values are not properly validated CVE-2016-2518: Crafted addpeer with hmode > 7 causes array wraparound with MATCH_ASSOC CVE-2016-2519: ctl_getitem() return value not always checked CVE-2016-1547: Validate crypto-NAKs, AKA: nak-dos CVE-2016-1548: Interleave-pivot - MITIGATION ONLY CVE-2015-7704: KoD fix: peer associations were broken by the fix for NtpBug2901, AKA: Symmetric active/passive mode is broken CVE-2015-8138: Zero Origin Timestamp Bypass, AKA: Additional KoD Checks CVE-2016-1550: Improve NTP security against buffer comparison timing attacks, authdecrypt-timing, AKA: authdecrypt-timing For more information, see: http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1549 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1551 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2517 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2519 ( Security fix ) +--------------------------+
Where to find the new packages: +-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.
Updated package for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/ntp-4.2.8p7-i486-1_slack13.0.txz
Updated package for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/ntp-4.2.8p7-x86_64-1_slack13.0.txz
Updated package for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/ntp-4.2.8p7-i486-1_slack13.1.txz
Updated package for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/ntp-4.2.8p7-x86_64-1_slack13.1.txz
Updated package for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/ntp-4.2.8p7-i486-1_slack13.37.txz
Updated package for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/ntp-4.2.8p7-x86_64-1_slack13.37.txz
Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/ntp-4.2.8p7-i486-1_slack14.0.txz
Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/ntp-4.2.8p7-x86_64-1_slack14.0.txz
Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/ntp-4.2.8p7-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/ntp-4.2.8p7-x86_64-1_slack14.1.txz
Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/ntp-4.2.8p7-i586-1.txz
Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/ntp-4.2.8p7-x86_64-1.txz
MD5 signatures: +-------------+
Slackware 13.0 package: 785dc2ef5f80edb28dc781e261c3fe3f ntp-4.2.8p7-i486-1_slack13.0.txz
Slackware x86_64 13.0 package: 899421096b7b63e6cb269f8b01dfd875 ntp-4.2.8p7-x86_64-1_slack13.0.txz
Slackware 13.1 package: dfd34cbd31be3572a2bcae7f59cdfd91 ntp-4.2.8p7-i486-1_slack13.1.txz
Slackware x86_64 13.1 package: 63c4b31736040e7950361cd0d7081c8b ntp-4.2.8p7-x86_64-1_slack13.1.txz
Slackware 13.37 package: e760ae0c6cc3fa933e4d65d6995b0c84 ntp-4.2.8p7-i486-1_slack13.37.txz
Slackware x86_64 13.37 package: aa448523b27bb4fcccc2f46cf4d72bc5 ntp-4.2.8p7-x86_64-1_slack13.37.txz
Slackware 14.0 package: 3bc7e54a4164a4f91be996b5cf2e643e ntp-4.2.8p7-i486-1_slack14.0.txz
Slackware x86_64 14.0 package: 0f6ea4dae476709f26f5d0e33378576c ntp-4.2.8p7-x86_64-1_slack14.0.txz
Slackware 14.1 package: dbe827ee7ece6ce5ca083cdd5960162c ntp-4.2.8p7-i486-1_slack14.1.txz
Slackware x86_64 14.1 package: 89f3edf183a6a9847d69b8349f98c901 ntp-4.2.8p7-x86_64-1_slack14.1.txz
Slackware -current package: 4018b86edd15e40e8c5e9f50d907dcff n/ntp-4.2.8p7-i586-1.txz
Slackware x86_64 -current package: 7dd6b64ba8c9fdaebb7becc1f5c3963d n/ntp-4.2.8p7-x86_64-1.txz
Installation instructions: +------------------------+
Upgrade the package as root:
upgradepkg ntp-4.2.8p7-i486-1_slack14.1.txz
Then, restart the NTP daemon:
sh /etc/rc.d/rc.ntpd restart
+-----+
Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com
+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address.
CVE-2015-7977 / CVE-2015-7978
Stephen Gray discovered that a NULL pointer dereference and a
buffer overflow in the handling of "ntpdc reslist" commands may
result in denial of service.
CVE-2016-2518
Yihan Lian discovered that an OOB memory access could potentially
crash ntpd.
For the stable distribution (jessie), these problems have been fixed in version 1:4.2.6.p5+dfsg-7+deb8u2.
For the testing distribution (stretch), these problems have been fixed in version 1:4.2.8p7+dfsg-1.
For the unstable distribution (sid), these problems have been fixed in version 1:4.2.8p7+dfsg-1.
We recommend that you upgrade your ntp packages
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201701-0399", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "6" }, { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "oracle", "version": "7" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 1.3, "vendor": "redhat", "version": "7.2" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.3, "vendor": "redhat", "version": "7.2" }, { "model": "ntp", "scope": "eq", "trust": 1.3, "vendor": "ntp", "version": "4.2.8" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.7" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.5" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "10.0" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.6" }, { "model": "clustered data ontap", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "oncommand performance manager", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "oncommand unified manager for clustered data ontap", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 1.0, "vendor": "freebsd", "version": "9.3" }, { "model": "freebsd", "scope": "eq", "trust": 1.0, "vendor": "freebsd", "version": "10.1" }, { "model": "simatic net cp 443-1 opc ua", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "data ontap", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "communications user data repository", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "12.0.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "8.0" }, { "model": "oncommand balance", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 1.0, "vendor": "freebsd", "version": "10.2" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "ntp", "scope": "gte", "trust": 1.0, "vendor": "ntp", "version": "4.3.0" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.2" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.3" }, { "model": "communications user data repository", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "10.0.1" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.6" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.3" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.4" }, { "model": "communications user data repository", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "10.0.0" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.7" }, { "model": "ntp", "scope": "lt", "trust": 1.0, "vendor": "ntp", "version": "4.2.8" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.6" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.4" }, { "model": "ntp", "scope": "lt", "trust": 1.0, "vendor": "ntp", "version": "4.3.92" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "freebsd", "scope": "eq", "trust": 1.0, "vendor": "freebsd", "version": "10.3" }, { "model": "ntp", "scope": "eq", "trust": 0.9, "vendor": "ntp", "version": "4.3.90" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ntp", "version": null }, { "model": "ntp", "scope": "eq", "trust": 0.8, "vendor": "ntp", "version": "4.3.92" }, { "model": "ntp", "scope": "lt", "trust": 0.8, "vendor": "ntp", "version": "4.3.x" }, { "model": "ntp", "scope": "eq", "trust": 0.8, "vendor": "ntp", "version": null }, { "model": "ntp", "scope": "eq", "trust": 0.8, "vendor": "ntp", "version": "4.2.8p9" }, { "model": "ntp", "scope": "eq", "trust": 0.6, "vendor": "ntp", "version": "4.3.84" }, { "model": "ntp", "scope": "eq", "trust": 0.6, "vendor": "ntp", "version": "4.3.82" }, { "model": "ntp", "scope": "eq", "trust": 0.6, "vendor": "ntp", "version": "4.3.85" }, { "model": "ntp", "scope": "eq", "trust": 0.6, "vendor": "ntp", "version": "4.3.89" }, { "model": "ntp", "scope": "eq", "trust": 0.6, "vendor": "ntp", "version": "4.3.91" }, { "model": "ntp", "scope": "eq", "trust": 0.6, "vendor": "ntp", "version": "4.3.87" }, { "model": "ntp", "scope": "eq", "trust": 0.6, "vendor": "ntp", "version": "4.3.81" }, { "model": "ntp", "scope": "eq", "trust": 0.6, "vendor": "ntp", "version": "4.3.86" }, { "model": "ntp", "scope": "eq", "trust": 0.6, "vendor": "ntp", "version": "4.3.88" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.0" }, { "model": "telepresence isdn link", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "physical access manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ntp", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.3.77" }, { "model": "security access manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.0.1" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.3" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.2" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.02" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.13" }, { "model": "dcm series 9900-digital content manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "application policy infrastructure controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.9" }, { "model": "ntp", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.3.25" }, { "model": "powerkvm", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.0" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.6" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.4" }, { "model": "network analysis module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.50" }, { "model": "nexus series switches", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "90000" }, { "model": "security access manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0.1.0" }, { "model": "4.2.8p4", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.20" }, { "model": "prime infrastructure", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.5" }, { "model": "security network protection", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "5.3.2.4" }, { "model": "exalogic infrastructure", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.0" }, { "model": "nac guest server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "enterprise content delivery system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "identity services engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.2.1" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1.1" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.4" }, { "model": "4.2.8p6", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.7" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.18" }, { "model": "security privileged identity manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.1" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "powerkvm", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "telepresence ex series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.16" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.13" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.0" }, { "model": "edge digital media player", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3400" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3" }, { "model": "4.2.7p11", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.0" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1.7" }, { "model": "p153", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.5" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.3" }, { "model": "video delivery system recorder", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "small business series wireless access points", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3210" }, { "model": "p7-rc2", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.4" }, { "model": "unified communications manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "jabber guest", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.0(2)" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.37" }, { "model": "p150", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.5" }, { "model": "smartcloud entry appliance fi", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.4" }, { "model": "4.2.5p186", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.8" }, { "model": "network device security assessment", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.1" }, { "model": "prime license manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "asa cx and cisco prime security manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "visual quality experience server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "digital media manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.3" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.1" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.4.0" }, { "model": "4.2.5p3", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.2.2" }, { "model": "prime collaboration assurance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "standalone rack server cimc", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.1" }, { "model": "telepresence conductor", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.19" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.1" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.5" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "security access manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1.8" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.37" }, { "model": "prime infrastructure standalone plug and play gateway", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unity express", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.0" }, { "model": "content security appliance updater servers", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ntp", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.3.70" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1.5" }, { "model": "telepresence video communication server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.2" }, { "model": "p8", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.4" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.8.1.0" }, { "model": "4.2.8p5", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "exalogic infrastructure", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "2.0" }, { "model": "telepresence exchange system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "telepresence sx series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "4.2.8p3", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.8.2.0" }, { "model": "prime access registrar appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "scos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.7.9.0" }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "14.04" }, { "model": "4.2.7p111", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "unified communications manager session management edition", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "meetingplace", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security privileged identity manager fixpack", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "2.0.28" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1.6" }, { "model": "support central", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.3" }, { "model": "ntp", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.6" }, { "model": "small business series wireless access points", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5000" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.2" }, { "model": "virtual security gateway for microsoft hyper-v", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "unified computing system e-series blade server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.5" }, { "model": "enterprise linux hpc node eus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.2" }, { "model": "clean access manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ntp", "scope": "ne", "trust": 0.3, "vendor": "ntp", "version": "4.3.92" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.2.3" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.11" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.10" }, { "model": "p74", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.5" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.1" }, { "model": "hosted collaboration mediation fulfillment", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.0" }, { "model": "p4", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.2" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "expressway series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "common services platform collector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.8.4.0" }, { "model": "prime service catalog virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry appliance fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.26" }, { "model": "4.2.8p2", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.17" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.15" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.12" }, { "model": "lotus protector for mail security", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.80" }, { "model": "prime access registrar", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "wap371 wireless access point", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.2" }, { "model": "onepk all-in-one vm", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "media experience engines", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "intrusion prevention system solutions", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.1" }, { "model": "access registrar appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "p1", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.2" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.14" }, { "model": "edge digital media player", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3000" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.8.5.0" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2" }, { "model": "videoscape control suite", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry appliance fi", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.0.4" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1.9" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1.3" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "management heartbeat server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.1" }, { "model": "series ip phones vpn feature", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8800-0" }, { "model": "mediasense", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "telepresence mx series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.14" }, { "model": "lotus protector for mail security", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.8.1.0" }, { "model": "small business series wireless access points", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1210" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.0" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.4" }, { "model": "industrial router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9100" }, { "model": "p6", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.4" }, { "model": "ucs central", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "telepresence profile series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.2" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.8.3.0" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "visual quality experience tools server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "4.2.8p1", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1.4" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.03" }, { "model": "video distribution suite for internet streaming", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "4.2.8p7", "scope": "ne", "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.3" }, { "model": "emergency responder", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "4.2.7p366", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "im and presence service", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.11" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.20" }, { "model": "connected grid routers", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "smartcloud entry appliance fi", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.0.4" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.4" }, { "model": "security network protection", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "5.3.1.10" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "p4", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.4" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.5" }, { "model": "telepresence integrator c series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.2" }, { "model": "show and share", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "sentinel", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security identity governance and intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.1" }, { "model": "p7", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.4" }, { "model": "nac server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "cloud object store", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.3" }, { "model": "ucs director", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ntp", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.3" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.1" }, { "model": "linux x86 64 -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.4.0" }, { "model": "p5", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.4" }, { "model": "nac appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" } ], "sources": [ { "db": "CERT/CC", "id": "VU#718152" }, { "db": "BID", "id": "88226" }, { "db": "JVNDB", "id": "JVNDB-2016-007714" }, { "db": "CNNVD", "id": "CNNVD-201604-609" }, { "db": "NVD", "id": "CVE-2016-2518" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens reported these vulnerabilities to CISA.", "sources": [ { "db": "CNNVD", "id": "CNNVD-201604-609" } ], "trust": 0.6 }, "cve": "CVE-2016-2518", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2016-2518", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2016-2518", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2016-2518", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-2518", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2016-2518", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201604-609", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2016-2518", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2016-2518" }, { "db": "JVNDB", "id": "JVNDB-2016-007714" }, { "db": "CNNVD", "id": "CNNVD-201604-609" }, { "db": "NVD", "id": "CVE-2016-2518" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value. The NTP.org reference implementation of ntpd contains multiple vulnerabilities. NTP is prone to a denial-of-service vulnerability. \nAn attacker can exploit this issue to cause a denial-of-service condition, denying service to legitimate users. \nVersions prior to NTP 4.2.8p7 and 4.3.x versions prior to 4.3.92 are vulnerable. ==========================================================================\nUbuntu Security Notice USN-3096-1\nOctober 05, 2016\n\nntp vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 16.04 LTS\n- Ubuntu 14.04 LTS\n- Ubuntu 12.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in NTP. A remote attacker could use this issue to perform a replay\nattack. (CVE-2015-7973)\n\nMatt Street discovered that NTP incorrectly verified peer associations of\nsymmetric keys. A remote attacker could use this issue to perform an\nimpersonation attack. (CVE-2015-7974)\n\nJonathan Gardner discovered that the NTP ntpq utility incorrectly handled\nmemory. This issue only affected Ubuntu 16.04\nLTS. (CVE-2015-7975)\n\nJonathan Gardner discovered that the NTP ntpq utility incorrectly handled\ndangerous characters in filenames. An attacker could possibly use this\nissue to overwrite arbitrary files. (CVE-2015-7976)\n\nStephen Gray discovered that NTP incorrectly handled large restrict lists. (CVE-2015-7977, CVE-2015-7978)\n\nAanchal Malhotra discovered that NTP incorrectly handled authenticated\nbroadcast mode. (CVE-2015-7979)\n\nJonathan Gardner discovered that NTP incorrectly handled origin timestamp\nchecks. A remote attacker could use this issue to spoof peer servers. \n(CVE-2015-8138)\n\nJonathan Gardner discovered that the NTP ntpq utility did not properly\nhandle certain incorrect values. (CVE-2015-8158)\n\nIt was discovered that the NTP cronjob incorrectly cleaned up the\nstatistics directory. A local attacker could possibly use this to escalate\nprivileges. (CVE-2016-0727)\n\nStephen Gray and Matthew Van Gundy discovered that NTP incorrectly\nvalidated crypto-NAKs. A remote attacker could possibly use this issue to\nprevent clients from synchronizing. A remote attacker could\npossibly use this issue to prevent clients from synchronizing. \n(CVE-2016-1548)\n\nMatthew Van Gundy, Stephen Gray and Loganaden Velvindron discovered that\nNTP incorrectly handled message authentication. (CVE-2016-1550)\n\nYihan Lian discovered that NTP incorrectly handled duplicate IPs on\nunconfig directives. (CVE-2016-4956)\n\nIn the default installation, attackers would be isolated by the NTP\nAppArmor profile. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 16.04 LTS:\n ntp 1:4.2.8p4+dfsg-3ubuntu5.3\n\nUbuntu 14.04 LTS:\n ntp 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10\n\nUbuntu 12.04 LTS:\n ntp 1:4.2.6.p3+dfsg-1ubuntu3.11\n\nIn general, a standard system update will make all the necessary changes. 6.7) - i386, noarch, ppc64, s390x, x86_64\n\n3. \n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201607-15\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: NTP: Multiple vulnerabilities\n Date: July 20, 2016\n Bugs: #563774, #572452, #581528, #584954\n ID: 201607-15\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in NTP, the worst of which\ncould lead to Denial of Service. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-misc/ntp \u003c 4.2.8_p8 \u003e= 4.2.8_p8\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in NTP. Please review the\nCVE identifiers referenced below for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll NTP users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/ntp-4.2.8_p8\"\n\nReferences\n==========\n\n[ 1 ] CVE-2015-7691\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7691\n[ 2 ] CVE-2015-7692\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7692\n[ 3 ] CVE-2015-7701\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7701\n[ 4 ] CVE-2015-7702\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7702\n[ 5 ] CVE-2015-7703\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7703\n[ 6 ] CVE-2015-7704\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7704\n[ 7 ] CVE-2015-7705\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7705\n[ 8 ] CVE-2015-7848\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7848\n[ 9 ] CVE-2015-7849\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7849\n[ 10 ] CVE-2015-7850\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7850\n[ 11 ] CVE-2015-7851\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7851\n[ 12 ] CVE-2015-7852\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7852\n[ 13 ] CVE-2015-7853\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7853\n[ 14 ] CVE-2015-7854\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7854\n[ 15 ] CVE-2015-7855\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7855\n[ 16 ] CVE-2015-7871\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7871\n[ 17 ] CVE-2015-7973\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7973\n[ 18 ] CVE-2015-7974\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7974\n[ 19 ] CVE-2015-7975\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7975\n[ 20 ] CVE-2015-7976\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7976\n[ 21 ] CVE-2015-7977\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7977\n[ 22 ] CVE-2015-7978\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7978\n[ 23 ] CVE-2015-7979\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7979\n[ 24 ] CVE-2015-8138\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8138\n[ 25 ] CVE-2015-8139\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8139\n[ 26 ] CVE-2015-8140\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8140\n[ 27 ] CVE-2015-8158\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8158\n[ 28 ] CVE-2016-1547\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1547\n[ 29 ] CVE-2016-1548\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1548\n[ 30 ] CVE-2016-1549\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1549\n[ 31 ] CVE-2016-1550\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1550\n[ 32 ] CVE-2016-1551\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1551\n[ 33 ] CVE-2016-2516\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2516\n[ 34 ] CVE-2016-2517\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2517\n[ 35 ] CVE-2016-2518\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2518\n[ 36 ] CVE-2016-2519\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2519\n[ 37 ] CVE-2016-4953\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4953\n[ 38 ] CVE-2016-4954\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4954\n[ 39 ] CVE-2016-4955\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4955\n[ 40 ] CVE-2016-4956\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4956\n[ 41 ] CVE-2016-4957\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4957\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201607-15\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2016 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: ntp security update\nAdvisory ID: RHSA-2016:1141-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2016:1141\nIssue date: 2016-05-31\nCVE Names: CVE-2015-7979 CVE-2016-1547 CVE-2016-1548 \n CVE-2016-1550 CVE-2016-2518 \n=====================================================================\n\n1. Summary:\n\nAn update for ntp is now available for Red Hat Enterprise Linux 6 and Red\nHat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, noarch, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64\n\n3. Description:\n\nThe Network Time Protocol (NTP) is used to synchronize a computer\u0027s time\nwith another referenced time source. These packages include the ntpd\nservice which continuously adjusts system time and utilities used to query\nand configure the ntpd service. \n\nSecurity Fix(es):\n\n* It was found that when NTP was configured in broadcast mode, a remote\nattacker could broadcast packets with bad authentication to all clients. \nThe clients, upon receiving the malformed packets, would break the\nassociation with the broadcast server, causing them to become out of sync\nover a longer period of time. (CVE-2015-7979)\n\n* A denial of service flaw was found in the way NTP handled preemptable\nclient associations. A remote attacker could send several crypto NAK\npackets to a victim client, each with a spoofed source address of an\nexisting associated peer, preventing that client from synchronizing its\ntime. (CVE-2016-1547)\n\n* It was found that an ntpd client could be forced to change from basic\nclient/server mode to the interleaved symmetric mode. A remote attacker\ncould use a spoofed packet that, when processed by an ntpd client, would\ncause that client to reject all future legitimate server responses,\neffectively disabling time synchronization on that client. (CVE-2016-1548)\n\n* A flaw was found in the way NTP\u0027s libntp performed message\nauthentication. An attacker able to observe the timing of the comparison\nfunction used in packet authentication could potentially use this flaw to\nrecover the message digest. (CVE-2016-1550)\n\n* An out-of-bounds access flaw was found in the way ntpd processed certain\npackets. An authenticated attacker could use a crafted packet to create a\npeer association with hmode of 7 and larger, which could potentially\n(although highly unlikely) cause ntpd to crash. (CVE-2016-2518)\n\nThe CVE-2016-1548 issue was discovered by Miroslav Lichvar (Red Hat). \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1300271 - CVE-2015-7979 ntp: off-path denial of service on authenticated broadcast mode\n1331461 - CVE-2016-1547 ntp: crypto-NAK preemptable association denial of service\n1331462 - CVE-2016-1548 ntp: ntpd switching to interleaved mode with spoofed packets\n1331464 - CVE-2016-1550 ntp: libntp message digest disclosure\n1331468 - CVE-2016-2518 ntp: out-of-bounds references on crafted packet\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nntp-4.2.6p5-10.el6.1.src.rpm\n\ni386:\nntp-4.2.6p5-10.el6.1.i686.rpm\nntp-debuginfo-4.2.6p5-10.el6.1.i686.rpm\nntpdate-4.2.6p5-10.el6.1.i686.rpm\n\nx86_64:\nntp-4.2.6p5-10.el6.1.x86_64.rpm\nntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm\nntpdate-4.2.6p5-10.el6.1.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\ni386:\nntp-debuginfo-4.2.6p5-10.el6.1.i686.rpm\nntp-perl-4.2.6p5-10.el6.1.i686.rpm\n\nnoarch:\nntp-doc-4.2.6p5-10.el6.1.noarch.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm\nntp-perl-4.2.6p5-10.el6.1.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nntp-4.2.6p5-10.el6.1.src.rpm\n\nx86_64:\nntp-4.2.6p5-10.el6.1.x86_64.rpm\nntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm\nntpdate-4.2.6p5-10.el6.1.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nnoarch:\nntp-doc-4.2.6p5-10.el6.1.noarch.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm\nntp-perl-4.2.6p5-10.el6.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nntp-4.2.6p5-10.el6.1.src.rpm\n\ni386:\nntp-4.2.6p5-10.el6.1.i686.rpm\nntp-debuginfo-4.2.6p5-10.el6.1.i686.rpm\nntpdate-4.2.6p5-10.el6.1.i686.rpm\n\nppc64:\nntp-4.2.6p5-10.el6.1.ppc64.rpm\nntp-debuginfo-4.2.6p5-10.el6.1.ppc64.rpm\nntpdate-4.2.6p5-10.el6.1.ppc64.rpm\n\ns390x:\nntp-4.2.6p5-10.el6.1.s390x.rpm\nntp-debuginfo-4.2.6p5-10.el6.1.s390x.rpm\nntpdate-4.2.6p5-10.el6.1.s390x.rpm\n\nx86_64:\nntp-4.2.6p5-10.el6.1.x86_64.rpm\nntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm\nntpdate-4.2.6p5-10.el6.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\ni386:\nntp-debuginfo-4.2.6p5-10.el6.1.i686.rpm\nntp-perl-4.2.6p5-10.el6.1.i686.rpm\n\nnoarch:\nntp-doc-4.2.6p5-10.el6.1.noarch.rpm\n\nppc64:\nntp-debuginfo-4.2.6p5-10.el6.1.ppc64.rpm\nntp-perl-4.2.6p5-10.el6.1.ppc64.rpm\n\ns390x:\nntp-debuginfo-4.2.6p5-10.el6.1.s390x.rpm\nntp-perl-4.2.6p5-10.el6.1.s390x.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm\nntp-perl-4.2.6p5-10.el6.1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nntp-4.2.6p5-10.el6.1.src.rpm\n\ni386:\nntp-4.2.6p5-10.el6.1.i686.rpm\nntp-debuginfo-4.2.6p5-10.el6.1.i686.rpm\nntpdate-4.2.6p5-10.el6.1.i686.rpm\n\nx86_64:\nntp-4.2.6p5-10.el6.1.x86_64.rpm\nntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm\nntpdate-4.2.6p5-10.el6.1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\ni386:\nntp-debuginfo-4.2.6p5-10.el6.1.i686.rpm\nntp-perl-4.2.6p5-10.el6.1.i686.rpm\n\nnoarch:\nntp-doc-4.2.6p5-10.el6.1.noarch.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-10.el6.1.x86_64.rpm\nntp-perl-4.2.6p5-10.el6.1.x86_64.rpm\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nntp-4.2.6p5-22.el7_2.2.src.rpm\n\nx86_64:\nntp-4.2.6p5-22.el7_2.2.x86_64.rpm\nntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm\nntpdate-4.2.6p5-22.el7_2.2.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nnoarch:\nntp-doc-4.2.6p5-22.el7_2.2.noarch.rpm\nntp-perl-4.2.6p5-22.el7_2.2.noarch.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm\nsntp-4.2.6p5-22.el7_2.2.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nntp-4.2.6p5-22.el7_2.2.src.rpm\n\nx86_64:\nntp-4.2.6p5-22.el7_2.2.x86_64.rpm\nntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm\nntpdate-4.2.6p5-22.el7_2.2.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nnoarch:\nntp-doc-4.2.6p5-22.el7_2.2.noarch.rpm\nntp-perl-4.2.6p5-22.el7_2.2.noarch.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm\nsntp-4.2.6p5-22.el7_2.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nntp-4.2.6p5-22.el7_2.2.src.rpm\n\nppc64:\nntp-4.2.6p5-22.el7_2.2.ppc64.rpm\nntp-debuginfo-4.2.6p5-22.el7_2.2.ppc64.rpm\nntpdate-4.2.6p5-22.el7_2.2.ppc64.rpm\n\nppc64le:\nntp-4.2.6p5-22.el7_2.2.ppc64le.rpm\nntp-debuginfo-4.2.6p5-22.el7_2.2.ppc64le.rpm\nntpdate-4.2.6p5-22.el7_2.2.ppc64le.rpm\n\ns390x:\nntp-4.2.6p5-22.el7_2.2.s390x.rpm\nntp-debuginfo-4.2.6p5-22.el7_2.2.s390x.rpm\nntpdate-4.2.6p5-22.el7_2.2.s390x.rpm\n\nx86_64:\nntp-4.2.6p5-22.el7_2.2.x86_64.rpm\nntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm\nntpdate-4.2.6p5-22.el7_2.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nnoarch:\nntp-doc-4.2.6p5-22.el7_2.2.noarch.rpm\nntp-perl-4.2.6p5-22.el7_2.2.noarch.rpm\n\nppc64:\nntp-debuginfo-4.2.6p5-22.el7_2.2.ppc64.rpm\nsntp-4.2.6p5-22.el7_2.2.ppc64.rpm\n\nppc64le:\nntp-debuginfo-4.2.6p5-22.el7_2.2.ppc64le.rpm\nsntp-4.2.6p5-22.el7_2.2.ppc64le.rpm\n\ns390x:\nntp-debuginfo-4.2.6p5-22.el7_2.2.s390x.rpm\nsntp-4.2.6p5-22.el7_2.2.s390x.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm\nsntp-4.2.6p5-22.el7_2.2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nntp-4.2.6p5-22.el7_2.2.src.rpm\n\nx86_64:\nntp-4.2.6p5-22.el7_2.2.x86_64.rpm\nntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm\nntpdate-4.2.6p5-22.el7_2.2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nnoarch:\nntp-doc-4.2.6p5-22.el7_2.2.noarch.rpm\nntp-perl-4.2.6p5-22.el7_2.2.noarch.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-22.el7_2.2.x86_64.rpm\nsntp-4.2.6p5-22.el7_2.2.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2015-7979\nhttps://access.redhat.com/security/cve/CVE-2016-1547\nhttps://access.redhat.com/security/cve/CVE-2016-1548\nhttps://access.redhat.com/security/cve/CVE-2016-1550\nhttps://access.redhat.com/security/cve/CVE-2016-2518\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2016 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFXTUp2XlSAg2UNWIIRAqUmAKC32P98McZUqU1gzWxBbCz0hn0eagCfRtrx\nSULnKXrtTJd5iJ6eQVtDnxA=\n=hETy\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n\n\nHere are the details from the Slackware 14.1 ChangeLog:\n+--------------------------+\npatches/packages/ntp-4.2.8p7-i486-1_slack14.1.txz: Upgraded. \n This release patches several low and medium severity security issues:\n CVE-2016-1551: Refclock impersonation vulnerability, AKA: refclock-peering\n CVE-2016-1549: Sybil vulnerability: ephemeral association attack,\n AKA: ntp-sybil - MITIGATION ONLY\n CVE-2016-2516: Duplicate IPs on unconfig directives will cause an assertion\n botch\n CVE-2016-2517: Remote configuration trustedkey/requestkey values are not\n properly validated\n CVE-2016-2518: Crafted addpeer with hmode \u003e 7 causes array wraparound with\n MATCH_ASSOC\n CVE-2016-2519: ctl_getitem() return value not always checked\n CVE-2016-1547: Validate crypto-NAKs, AKA: nak-dos\n CVE-2016-1548: Interleave-pivot - MITIGATION ONLY\n CVE-2015-7704: KoD fix: peer associations were broken by the fix for\n NtpBug2901, AKA: Symmetric active/passive mode is broken\n CVE-2015-8138: Zero Origin Timestamp Bypass, AKA: Additional KoD Checks\n CVE-2016-1550: Improve NTP security against buffer comparison timing attacks,\n authdecrypt-timing, AKA: authdecrypt-timing\n For more information, see:\n http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1549\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1551\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2517\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2519\n (* Security fix *)\n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated package for Slackware 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/ntp-4.2.8p7-i486-1_slack13.0.txz\n\nUpdated package for Slackware x86_64 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/ntp-4.2.8p7-x86_64-1_slack13.0.txz\n\nUpdated package for Slackware 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/ntp-4.2.8p7-i486-1_slack13.1.txz\n\nUpdated package for Slackware x86_64 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/ntp-4.2.8p7-x86_64-1_slack13.1.txz\n\nUpdated package for Slackware 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/ntp-4.2.8p7-i486-1_slack13.37.txz\n\nUpdated package for Slackware x86_64 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/ntp-4.2.8p7-x86_64-1_slack13.37.txz\n\nUpdated package for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/ntp-4.2.8p7-i486-1_slack14.0.txz\n\nUpdated package for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/ntp-4.2.8p7-x86_64-1_slack14.0.txz\n\nUpdated package for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/ntp-4.2.8p7-i486-1_slack14.1.txz\n\nUpdated package for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/ntp-4.2.8p7-x86_64-1_slack14.1.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/ntp-4.2.8p7-i586-1.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/ntp-4.2.8p7-x86_64-1.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 13.0 package:\n785dc2ef5f80edb28dc781e261c3fe3f ntp-4.2.8p7-i486-1_slack13.0.txz\n\nSlackware x86_64 13.0 package:\n899421096b7b63e6cb269f8b01dfd875 ntp-4.2.8p7-x86_64-1_slack13.0.txz\n\nSlackware 13.1 package:\ndfd34cbd31be3572a2bcae7f59cdfd91 ntp-4.2.8p7-i486-1_slack13.1.txz\n\nSlackware x86_64 13.1 package:\n63c4b31736040e7950361cd0d7081c8b ntp-4.2.8p7-x86_64-1_slack13.1.txz\n\nSlackware 13.37 package:\ne760ae0c6cc3fa933e4d65d6995b0c84 ntp-4.2.8p7-i486-1_slack13.37.txz\n\nSlackware x86_64 13.37 package:\naa448523b27bb4fcccc2f46cf4d72bc5 ntp-4.2.8p7-x86_64-1_slack13.37.txz\n\nSlackware 14.0 package:\n3bc7e54a4164a4f91be996b5cf2e643e ntp-4.2.8p7-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 package:\n0f6ea4dae476709f26f5d0e33378576c ntp-4.2.8p7-x86_64-1_slack14.0.txz\n\nSlackware 14.1 package:\ndbe827ee7ece6ce5ca083cdd5960162c ntp-4.2.8p7-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 package:\n89f3edf183a6a9847d69b8349f98c901 ntp-4.2.8p7-x86_64-1_slack14.1.txz\n\nSlackware -current package:\n4018b86edd15e40e8c5e9f50d907dcff n/ntp-4.2.8p7-i586-1.txz\n\nSlackware x86_64 -current package:\n7dd6b64ba8c9fdaebb7becc1f5c3963d n/ntp-4.2.8p7-x86_64-1.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the package as root:\n# upgradepkg ntp-4.2.8p7-i486-1_slack14.1.txz\n\nThen, restart the NTP daemon:\n\n# sh /etc/rc.d/rc.ntpd restart\n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list: |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message: |\n| |\n| unsubscribe slackware-security |\n| |\n| You will get a confirmation message back containing instructions to |\n| complete the process. Please do not reply to this email address. \n\nCVE-2015-7977 / CVE-2015-7978\n\n Stephen Gray discovered that a NULL pointer dereference and a\n buffer overflow in the handling of \"ntpdc reslist\" commands may\n result in denial of service. \n\nCVE-2016-2518\n\n Yihan Lian discovered that an OOB memory access could potentially\n crash ntpd. \n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 1:4.2.6.p5+dfsg-7+deb8u2. \n\nFor the testing distribution (stretch), these problems have been fixed\nin version 1:4.2.8p7+dfsg-1. \n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 1:4.2.8p7+dfsg-1. \n\nWe recommend that you upgrade your ntp packages", "sources": [ { "db": "NVD", "id": "CVE-2016-2518" }, { "db": "CERT/CC", "id": "VU#718152" }, { "db": "JVNDB", "id": "JVNDB-2016-007714" }, { "db": "BID", "id": "88226" }, { "db": "VULMON", "id": "CVE-2016-2518" }, { "db": "PACKETSTORM", "id": "138984" }, { "db": "PACKETSTORM", "id": "138162" }, { "db": "PACKETSTORM", "id": "137992" }, { "db": "PACKETSTORM", "id": "137244" }, { "db": "PACKETSTORM", "id": "136864" }, { "db": "PACKETSTORM", "id": "138052" } ], "trust": 3.24 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#718152", "trust": 3.6 }, { "db": "NVD", "id": "CVE-2016-2518", "trust": 3.4 }, { "db": "BID", "id": "88226", "trust": 2.0 }, { "db": "PACKETSTORM", "id": "136864", "trust": 1.8 }, { "db": "SECTRACK", "id": "1035705", "trust": 1.7 }, { "db": "SIEMENS", "id": "SSA-211752", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-21-159-11", "trust": 1.7 }, { "db": "JVN", "id": "JVNVU95781418", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU91176422", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2016-007714", "trust": 0.8 }, { "db": "CS-HELP", "id": "SB2021061008", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201604-609", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2016-2518", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "138984", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "138162", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "137992", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "137244", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "138052", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#718152" }, { "db": "VULMON", "id": "CVE-2016-2518" }, { "db": "BID", "id": "88226" }, { "db": "JVNDB", "id": "JVNDB-2016-007714" }, { "db": "PACKETSTORM", "id": "138984" }, { "db": "PACKETSTORM", "id": "138162" }, { "db": "PACKETSTORM", "id": "137992" }, { "db": "PACKETSTORM", "id": "137244" }, { "db": "PACKETSTORM", "id": "136864" }, { "db": "PACKETSTORM", "id": "138052" }, { "db": "CNNVD", "id": "CNNVD-201604-609" }, { "db": "NVD", "id": "CVE-2016-2518" } ] }, "id": "VAR-201701-0399", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.365299625 }, "last_update_date": "2024-11-23T20:27:39.481000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Oracle\u00a0Solaris\u00a0Third\u00a0Party\u00a0Bulletin\u00a0-\u00a0April\u00a02016", "trust": 0.8, "url": "http://support.ntp.org/bin/view/Main/NtpBug3009" }, { "title": "ntpd Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=61292" }, { "title": "Red Hat: CVE-2016-2518", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2016-2518" }, { "title": "Amazon Linux AMI: ALAS-2016-708", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2016-708" }, { "title": "Ubuntu Security Notice: ntp vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3096-1" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=85311fa037162a48cd67fd63f52a6478" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - April 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=976a4da35d55283870dbb31b88a6c655" }, { "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - April 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=83bbd91f8369c8f064e6d68dac68400f" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - July 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=3a04485ebb79f7fbc2472bf9af5ce489" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - January 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=e2a7f287e9acc8c64ab3df71130bc64d" }, { "title": "satellite-host-cve", "trust": 0.1, "url": "https://github.com/RedHatSatellite/satellite-host-cve " } ], "sources": [ { "db": "VULMON", "id": "CVE-2016-2518" }, { "db": "JVNDB", "id": "JVNDB-2016-007714" }, { "db": "CNNVD", "id": "CNNVD-201604-609" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.0 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007714" }, { "db": "NVD", "id": "CVE-2016-2518" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "https://www.kb.cert.org/vuls/id/718152" }, { "trust": 2.8, "url": "https://www.debian.org/security/2016/dsa-3629" }, { "trust": 2.5, "url": "http://support.ntp.org/bin/view/main/securitynotice#april_2016_ntp_4_2_8p7_security" }, { "trust": 2.3, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" }, { "trust": 2.1, "url": "https://access.redhat.com/errata/rhsa-2016:1141" }, { "trust": 2.0, "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "trust": 2.0, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160428-ntpd" }, { "trust": 1.8, "url": "https://security.gentoo.org/glsa/201607-15" }, { "trust": 1.8, "url": "http://rhn.redhat.com/errata/rhsa-2016-1552.html" }, { "trust": 1.8, "url": "http://www.ubuntu.com/usn/usn-3096-1" }, { "trust": 1.7, "url": "http://support.ntp.org/bin/view/main/ntpbug3009" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/88226" }, { "trust": 1.7, "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1035705" }, { "trust": 1.7, "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "trust": 1.7, "url": "https://security.freebsd.org/advisories/freebsd-sa-16:16.ntp.asc" }, { "trust": 1.7, "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" }, { "trust": 1.7, "url": "http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" }, { "trust": 1.7, "url": "http://www.securityfocus.com/archive/1/538233/100/0/threaded" }, { "trust": 1.7, "url": "http://packetstormsecurity.com/files/136864/slackware-security-advisory-ntp-updates.html" }, { "trust": 1.7, "url": "https://support.f5.com/csp/article/k20804323" }, { "trust": 1.7, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-may/183647.html" }, { "trust": 1.7, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-may/184669.html" }, { "trust": 0.8, "url": "http://support.ntp.org/bin/view/main/securitynotice#january_2016_ntp_4_2_8p6_securit" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu91176422/" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu95781418/index.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-2518" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1547" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021061008" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1548" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7979" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1550" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2518" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8138" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2016-2518" }, { "trust": 0.3, "url": "http://www.ntp.org/" }, { "trust": 0.3, "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1023885" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1024073" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1024157" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8n1021521" }, { "trust": 0.3, "url": "http://support.ntp.org/bin/view/main/ntpbug3009 " }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21983803" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21985122" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21986956" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21988706" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21989542" }, { "trust": 0.3, "url": "http://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7978" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2516" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7974" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7977" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8158" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7973" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7975" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7976" }, { "trust": 0.2, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2015-7979" }, { "trust": 0.2, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2016-1547" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2016-1548" }, { "trust": 0.2, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2016-1550" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7704" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/125.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/3096-1/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4956" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0727" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4954" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/ntp/1:4.2.6.p5+dfsg-3ubuntu2.14.04.10" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4955" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/ntp/1:4.2.6.p3+dfsg-1ubuntu3.11" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/ntp/1:4.2.8p4+dfsg-3ubuntu5.3" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7871" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7702" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7705" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1549" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7702" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7849" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7852" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7978" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8140" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7855" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7852" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1551" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2516" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7975" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7848" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8139" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8158" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4954" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4956" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7973" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7853" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7701" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7704" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8140" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7691" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8139" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4957" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7703" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7855" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4955" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7849" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7854" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7703" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7705" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2517" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1548" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7691" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1547" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7854" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7853" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2519" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2518" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7851" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7692" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7871" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7977" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7848" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1550" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7850" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7850" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7701" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7692" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8138" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7979" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7974" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7851" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4953" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7976" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2516" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7704" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1551" }, { "trust": 0.1, "url": "http://slackware.com" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2519" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2517" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2519" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1547" }, { "trust": 0.1, "url": "http://slackware.com/gpg-key" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8138" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2518" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1549" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1551" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1550" }, { "trust": 0.1, "url": "http://support.ntp.org/bin/view/main/securitynotice#recent_vulnerabilities" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2517" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1548" }, { "trust": 0.1, "url": "http://osuosl.org)" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1549" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://www.debian.org/security/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#718152" }, { "db": "VULMON", "id": "CVE-2016-2518" }, { "db": "BID", "id": "88226" }, { "db": "JVNDB", "id": "JVNDB-2016-007714" }, { "db": "PACKETSTORM", "id": "138984" }, { "db": "PACKETSTORM", "id": "138162" }, { "db": "PACKETSTORM", "id": "137992" }, { "db": "PACKETSTORM", "id": "137244" }, { "db": "PACKETSTORM", "id": "136864" }, { "db": "PACKETSTORM", "id": "138052" }, { "db": "CNNVD", "id": "CNNVD-201604-609" }, { "db": "NVD", "id": "CVE-2016-2518" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#718152" }, { "db": "VULMON", "id": "CVE-2016-2518" }, { "db": "BID", "id": "88226" }, { "db": "JVNDB", "id": "JVNDB-2016-007714" }, { "db": "PACKETSTORM", "id": "138984" }, { "db": "PACKETSTORM", "id": "138162" }, { "db": "PACKETSTORM", "id": "137992" }, { "db": "PACKETSTORM", "id": "137244" }, { "db": "PACKETSTORM", "id": "136864" }, { "db": "PACKETSTORM", "id": "138052" }, { "db": "CNNVD", "id": "CNNVD-201604-609" }, { "db": "NVD", "id": "CVE-2016-2518" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-04-27T00:00:00", "db": "CERT/CC", "id": "VU#718152" }, { "date": "2017-01-30T00:00:00", "db": "VULMON", "id": "CVE-2016-2518" }, { "date": "2016-04-26T00:00:00", "db": "BID", "id": "88226" }, { "date": "2017-03-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007714" }, { "date": "2016-10-05T22:33:00", "db": "PACKETSTORM", "id": "138984" }, { "date": "2016-08-03T18:16:52", "db": "PACKETSTORM", "id": "138162" }, { "date": "2016-07-21T15:56:23", "db": "PACKETSTORM", "id": "137992" }, { "date": "2016-05-31T13:33:49", "db": "PACKETSTORM", "id": "137244" }, { "date": "2016-05-02T21:38:58", "db": "PACKETSTORM", "id": "136864" }, { "date": "2016-07-26T19:19:00", "db": "PACKETSTORM", "id": "138052" }, { "date": "2016-04-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201604-609" }, { "date": "2017-01-30T21:59:01.080000", "db": "NVD", "id": "CVE-2016-2518" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-04-28T00:00:00", "db": "CERT/CC", "id": "VU#718152" }, { "date": "2021-06-10T00:00:00", "db": "VULMON", "id": "CVE-2016-2518" }, { "date": "2016-11-24T01:07:00", "db": "BID", "id": "88226" }, { "date": "2021-06-10T09:03:00", "db": "JVNDB", "id": "JVNDB-2016-007714" }, { "date": "2021-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201604-609" }, { "date": "2024-11-21T02:48:36.477000", "db": "NVD", "id": "CVE-2016-2518" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "138984" }, { "db": "PACKETSTORM", "id": "138162" }, { "db": "PACKETSTORM", "id": "137244" }, { "db": "CNNVD", "id": "CNNVD-201604-609" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "NTP.org ntpd contains multiple vulnerabilities", "sources": [ { "db": "CERT/CC", "id": "VU#718152" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201604-609" } ], "trust": 0.6 } }
opensuse-su-2024:10181-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ntp-4.2.8p9-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ntp-4.2.8p9-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10181", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10181-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2009-0159 page", "url": "https://www.suse.com/security/cve/CVE-2009-0159/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-1252 page", "url": "https://www.suse.com/security/cve/CVE-2009-1252/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-5211 page", "url": "https://www.suse.com/security/cve/CVE-2013-5211/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9293 page", "url": "https://www.suse.com/security/cve/CVE-2014-9293/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9294 page", "url": "https://www.suse.com/security/cve/CVE-2014-9294/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9295 page", "url": "https://www.suse.com/security/cve/CVE-2014-9295/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9296 page", "url": "https://www.suse.com/security/cve/CVE-2014-9296/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9297 page", "url": "https://www.suse.com/security/cve/CVE-2014-9297/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9298 page", "url": "https://www.suse.com/security/cve/CVE-2014-9298/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1798 page", "url": "https://www.suse.com/security/cve/CVE-2015-1798/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1799 page", "url": "https://www.suse.com/security/cve/CVE-2015-1799/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5300 page", "url": "https://www.suse.com/security/cve/CVE-2015-5300/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7691 page", "url": "https://www.suse.com/security/cve/CVE-2015-7691/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7692 page", "url": "https://www.suse.com/security/cve/CVE-2015-7692/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7701 page", "url": "https://www.suse.com/security/cve/CVE-2015-7701/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7702 page", "url": "https://www.suse.com/security/cve/CVE-2015-7702/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7703 page", "url": "https://www.suse.com/security/cve/CVE-2015-7703/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7704 page", "url": "https://www.suse.com/security/cve/CVE-2015-7704/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7705 page", "url": "https://www.suse.com/security/cve/CVE-2015-7705/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7848 page", "url": "https://www.suse.com/security/cve/CVE-2015-7848/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7849 page", "url": "https://www.suse.com/security/cve/CVE-2015-7849/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7850 page", "url": "https://www.suse.com/security/cve/CVE-2015-7850/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7851 page", "url": "https://www.suse.com/security/cve/CVE-2015-7851/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7852 page", "url": "https://www.suse.com/security/cve/CVE-2015-7852/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7853 page", "url": "https://www.suse.com/security/cve/CVE-2015-7853/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7854 page", "url": "https://www.suse.com/security/cve/CVE-2015-7854/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7855 page", "url": "https://www.suse.com/security/cve/CVE-2015-7855/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7871 page", "url": "https://www.suse.com/security/cve/CVE-2015-7871/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7973 page", "url": "https://www.suse.com/security/cve/CVE-2015-7973/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7974 page", "url": "https://www.suse.com/security/cve/CVE-2015-7974/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7975 page", "url": "https://www.suse.com/security/cve/CVE-2015-7975/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7976 page", "url": "https://www.suse.com/security/cve/CVE-2015-7976/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7977 page", "url": "https://www.suse.com/security/cve/CVE-2015-7977/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7978 page", "url": "https://www.suse.com/security/cve/CVE-2015-7978/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7979 page", "url": "https://www.suse.com/security/cve/CVE-2015-7979/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8138 page", "url": "https://www.suse.com/security/cve/CVE-2015-8138/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8158 page", "url": "https://www.suse.com/security/cve/CVE-2015-8158/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1547 page", "url": "https://www.suse.com/security/cve/CVE-2016-1547/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1548 page", "url": "https://www.suse.com/security/cve/CVE-2016-1548/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1549 page", "url": "https://www.suse.com/security/cve/CVE-2016-1549/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1550 page", "url": "https://www.suse.com/security/cve/CVE-2016-1550/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1551 page", "url": "https://www.suse.com/security/cve/CVE-2016-1551/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2516 page", "url": "https://www.suse.com/security/cve/CVE-2016-2516/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2517 page", "url": "https://www.suse.com/security/cve/CVE-2016-2517/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2518 page", "url": "https://www.suse.com/security/cve/CVE-2016-2518/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2519 page", "url": "https://www.suse.com/security/cve/CVE-2016-2519/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4953 page", "url": "https://www.suse.com/security/cve/CVE-2016-4953/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4954 page", "url": "https://www.suse.com/security/cve/CVE-2016-4954/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4955 page", "url": "https://www.suse.com/security/cve/CVE-2016-4955/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4956 page", "url": "https://www.suse.com/security/cve/CVE-2016-4956/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4957 page", "url": "https://www.suse.com/security/cve/CVE-2016-4957/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7426 page", "url": "https://www.suse.com/security/cve/CVE-2016-7426/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7427 page", "url": "https://www.suse.com/security/cve/CVE-2016-7427/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7428 page", "url": "https://www.suse.com/security/cve/CVE-2016-7428/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7429 page", "url": "https://www.suse.com/security/cve/CVE-2016-7429/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7431 page", "url": "https://www.suse.com/security/cve/CVE-2016-7431/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7433 page", "url": "https://www.suse.com/security/cve/CVE-2016-7433/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7434 page", "url": "https://www.suse.com/security/cve/CVE-2016-7434/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9310 page", "url": "https://www.suse.com/security/cve/CVE-2016-9310/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9311 page", "url": "https://www.suse.com/security/cve/CVE-2016-9311/" } ], "title": "ntp-4.2.8p9-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10181-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p9-1.1.aarch64", "product": { "name": "ntp-4.2.8p9-1.1.aarch64", "product_id": "ntp-4.2.8p9-1.1.aarch64" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p9-1.1.aarch64", "product": { "name": "ntp-doc-4.2.8p9-1.1.aarch64", "product_id": "ntp-doc-4.2.8p9-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p9-1.1.ppc64le", "product": { "name": "ntp-4.2.8p9-1.1.ppc64le", "product_id": "ntp-4.2.8p9-1.1.ppc64le" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p9-1.1.ppc64le", "product": { "name": "ntp-doc-4.2.8p9-1.1.ppc64le", "product_id": "ntp-doc-4.2.8p9-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p9-1.1.s390x", "product": { "name": "ntp-4.2.8p9-1.1.s390x", "product_id": "ntp-4.2.8p9-1.1.s390x" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p9-1.1.s390x", "product": { "name": "ntp-doc-4.2.8p9-1.1.s390x", "product_id": "ntp-doc-4.2.8p9-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p9-1.1.x86_64", "product": { "name": "ntp-4.2.8p9-1.1.x86_64", "product_id": "ntp-4.2.8p9-1.1.x86_64" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p9-1.1.x86_64", "product": { "name": "ntp-doc-4.2.8p9-1.1.x86_64", "product_id": "ntp-doc-4.2.8p9-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p9-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64" }, "product_reference": "ntp-4.2.8p9-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p9-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le" }, "product_reference": "ntp-4.2.8p9-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p9-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x" }, "product_reference": "ntp-4.2.8p9-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p9-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64" }, "product_reference": "ntp-4.2.8p9-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p9-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64" }, "product_reference": "ntp-doc-4.2.8p9-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p9-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le" }, "product_reference": "ntp-doc-4.2.8p9-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p9-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x" }, "product_reference": "ntp-doc-4.2.8p9-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p9-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" }, "product_reference": "ntp-doc-4.2.8p9-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-0159" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-0159", "url": "https://www.suse.com/security/cve/CVE-2009-0159" }, { "category": "external", "summary": "SUSE Bug 484653 for CVE-2009-0159", "url": "https://bugzilla.suse.com/484653" }, { "category": "external", "summary": "SUSE Bug 501632 for CVE-2009-0159", "url": "https://bugzilla.suse.com/501632" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2009-0159" }, { "cve": "CVE-2009-1252", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-1252" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in ntpd in NTP before 4.2.4p7 and 4.2.5 before 4.2.5p74, when OpenSSL and autokey are enabled, allows remote attackers to execute arbitrary code via a crafted packet containing an extension field.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-1252", "url": "https://www.suse.com/security/cve/CVE-2009-1252" }, { "category": "external", "summary": "SUSE Bug 501632 for CVE-2009-1252", "url": "https://bugzilla.suse.com/501632" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2009-1252" }, { "cve": "CVE-2013-5211", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-5211" } ], "notes": [ { "category": "general", "text": "The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-5211", "url": "https://www.suse.com/security/cve/CVE-2013-5211" }, { "category": "external", "summary": "SUSE Bug 857195 for CVE-2013-5211", "url": "https://bugzilla.suse.com/857195" }, { "category": "external", "summary": "SUSE Bug 889447 for CVE-2013-5211", "url": "https://bugzilla.suse.com/889447" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2013-5211", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-5211" }, { "cve": "CVE-2014-9293", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9293" } ], "notes": [ { "category": "general", "text": "The config_auth function in ntpd in NTP before 4.2.7p11, when an auth key is not configured, improperly generates a key, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9293", "url": "https://www.suse.com/security/cve/CVE-2014-9293" }, { "category": "external", "summary": "SUSE Bug 910764 for CVE-2014-9293", "url": "https://bugzilla.suse.com/910764" }, { "category": "external", "summary": "SUSE Bug 911053 for CVE-2014-9293", "url": "https://bugzilla.suse.com/911053" }, { "category": "external", "summary": "SUSE Bug 911792 for CVE-2014-9293", "url": "https://bugzilla.suse.com/911792" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2014-9293", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-9293" }, { "cve": "CVE-2014-9294", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9294" } ], "notes": [ { "category": "general", "text": "util/ntp-keygen.c in ntp-keygen in NTP before 4.2.7p230 uses a weak RNG seed, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9294", "url": "https://www.suse.com/security/cve/CVE-2014-9294" }, { "category": "external", "summary": "SUSE Bug 910764 for CVE-2014-9294", "url": "https://bugzilla.suse.com/910764" }, { "category": "external", "summary": "SUSE Bug 911053 for CVE-2014-9294", "url": "https://bugzilla.suse.com/911053" }, { "category": "external", "summary": "SUSE Bug 911792 for CVE-2014-9294", "url": "https://bugzilla.suse.com/911792" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2014-9294", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-9294" }, { "cve": "CVE-2014-9295", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9295" } ], "notes": [ { "category": "general", "text": "Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers to execute arbitrary code via a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata function, and (3) the configure function.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9295", "url": "https://www.suse.com/security/cve/CVE-2014-9295" }, { "category": "external", "summary": "SUSE Bug 910764 for CVE-2014-9295", "url": "https://bugzilla.suse.com/910764" }, { "category": "external", "summary": "SUSE Bug 911053 for CVE-2014-9295", "url": "https://bugzilla.suse.com/911053" }, { "category": "external", "summary": "SUSE Bug 911792 for CVE-2014-9295", "url": "https://bugzilla.suse.com/911792" }, { "category": "external", "summary": "SUSE Bug 916239 for CVE-2014-9295", "url": "https://bugzilla.suse.com/916239" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2014-9295", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-9295" }, { "cve": "CVE-2014-9296", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9296" } ], "notes": [ { "category": "general", "text": "The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended association change via crafted packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9296", "url": "https://www.suse.com/security/cve/CVE-2014-9296" }, { "category": "external", "summary": "SUSE Bug 910764 for CVE-2014-9296", "url": "https://bugzilla.suse.com/910764" }, { "category": "external", "summary": "SUSE Bug 911053 for CVE-2014-9296", "url": "https://bugzilla.suse.com/911053" }, { "category": "external", "summary": "SUSE Bug 911792 for CVE-2014-9296", "url": "https://bugzilla.suse.com/911792" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2014-9296", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2014-9296", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-9296" }, { "cve": "CVE-2014-9297", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9297" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9750, CVE-2014-9751. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9297", "url": "https://www.suse.com/security/cve/CVE-2014-9297" }, { "category": "external", "summary": "SUSE Bug 911792 for CVE-2014-9297", "url": "https://bugzilla.suse.com/911792" }, { "category": "external", "summary": "SUSE Bug 948963 for CVE-2014-9297", "url": "https://bugzilla.suse.com/948963" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2014-9297", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-9297" }, { "cve": "CVE-2014-9298", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9298" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9750, CVE-2014-9751. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9298", "url": "https://www.suse.com/security/cve/CVE-2014-9298" }, { "category": "external", "summary": "SUSE Bug 911792 for CVE-2014-9298", "url": "https://bugzilla.suse.com/911792" }, { "category": "external", "summary": "SUSE Bug 948963 for CVE-2014-9298", "url": "https://bugzilla.suse.com/948963" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2014-9298", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-9298" }, { "cve": "CVE-2015-1798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1798" } ], "notes": [ { "category": "general", "text": "The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p2 requires a correct MAC only if the MAC field has a nonzero length, which makes it easier for man-in-the-middle attackers to spoof packets by omitting the MAC.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1798", "url": "https://www.suse.com/security/cve/CVE-2015-1798" }, { "category": "external", "summary": "SUSE Bug 924202 for CVE-2015-1798", "url": "https://bugzilla.suse.com/924202" }, { "category": "external", "summary": "SUSE Bug 927497 for CVE-2015-1798", "url": "https://bugzilla.suse.com/927497" }, { "category": "external", "summary": "SUSE Bug 928321 for CVE-2015-1798", "url": "https://bugzilla.suse.com/928321" }, { "category": "external", "summary": "SUSE Bug 936327 for CVE-2015-1798", "url": "https://bugzilla.suse.com/936327" }, { "category": "external", "summary": "SUSE Bug 957163 for CVE-2015-1798", "url": "https://bugzilla.suse.com/957163" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1798" }, { "cve": "CVE-2015-1799", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1799" } ], "notes": [ { "category": "general", "text": "The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1799", "url": "https://www.suse.com/security/cve/CVE-2015-1799" }, { "category": "external", "summary": "SUSE Bug 924202 for CVE-2015-1799", "url": "https://bugzilla.suse.com/924202" }, { "category": "external", "summary": "SUSE Bug 927497 for CVE-2015-1799", "url": "https://bugzilla.suse.com/927497" }, { "category": "external", "summary": "SUSE Bug 928321 for CVE-2015-1799", "url": "https://bugzilla.suse.com/928321" }, { "category": "external", "summary": "SUSE Bug 936327 for CVE-2015-1799", "url": "https://bugzilla.suse.com/936327" }, { "category": "external", "summary": "SUSE Bug 943565 for CVE-2015-1799", "url": "https://bugzilla.suse.com/943565" }, { "category": "external", "summary": "SUSE Bug 957163 for CVE-2015-1799", "url": "https://bugzilla.suse.com/957163" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-1799", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962624 for CVE-2015-1799", "url": "https://bugzilla.suse.com/962624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1799" }, { "cve": "CVE-2015-5300", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5300" } ], "notes": [ { "category": "general", "text": "The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5300", "url": "https://www.suse.com/security/cve/CVE-2015-5300" }, { "category": "external", "summary": "SUSE Bug 951629 for CVE-2015-5300", "url": "https://bugzilla.suse.com/951629" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-5300", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962624 for CVE-2015-5300", "url": "https://bugzilla.suse.com/962624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-5300" }, { "cve": "CVE-2015-7691", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7691" } ], "notes": [ { "category": "general", "text": "The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted packets containing particular autokey operations. NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7691", "url": "https://www.suse.com/security/cve/CVE-2015-7691" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7691", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 911792 for CVE-2015-7691", "url": "https://bugzilla.suse.com/911792" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7691", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7691", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7691", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-7691" }, { "cve": "CVE-2015-7692", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7692" } ], "notes": [ { "category": "general", "text": "The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash). NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7692", "url": "https://www.suse.com/security/cve/CVE-2015-7692" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7692", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 911792 for CVE-2015-7692", "url": "https://bugzilla.suse.com/911792" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7692", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7692", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7692", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-7692" }, { "cve": "CVE-2015-7701", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7701" } ], "notes": [ { "category": "general", "text": "Memory leak in the CRYPTO_ASSOC function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (memory consumption).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7701", "url": "https://www.suse.com/security/cve/CVE-2015-7701" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7701", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7701", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7701", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7701", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-7701" }, { "cve": "CVE-2015-7702", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7702" } ], "notes": [ { "category": "general", "text": "The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash). NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7702", "url": "https://www.suse.com/security/cve/CVE-2015-7702" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7702", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 911792 for CVE-2015-7702", "url": "https://bugzilla.suse.com/911792" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7702", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7702", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7702", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-7702" }, { "cve": "CVE-2015-7703", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7703" } ], "notes": [ { "category": "general", "text": "The \"pidfile\" or \"driftfile\" directives in NTP ntpd 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77, when ntpd is configured to allow remote configuration, allows remote attackers with an IP address that is allowed to send configuration requests, and with knowledge of the remote configuration password to write to arbitrary files via the :config command.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7703", "url": "https://www.suse.com/security/cve/CVE-2015-7703" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7703", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 943216 for CVE-2015-7703", "url": "https://bugzilla.suse.com/943216" }, { "category": "external", "summary": "SUSE Bug 943218 for CVE-2015-7703", "url": "https://bugzilla.suse.com/943218" }, { "category": "external", "summary": "SUSE Bug 943219 for CVE-2015-7703", "url": "https://bugzilla.suse.com/943219" }, { "category": "external", "summary": "SUSE Bug 943221 for CVE-2015-7703", "url": "https://bugzilla.suse.com/943221" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7703", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7703", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-7703" }, { "cve": "CVE-2015-7704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7704" } ], "notes": [ { "category": "general", "text": "The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted \"KOD\" messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7704", "url": "https://www.suse.com/security/cve/CVE-2015-7704" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7704", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7704", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 952611 for CVE-2015-7704", "url": "https://bugzilla.suse.com/952611" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7704", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2015-7704", "url": "https://bugzilla.suse.com/977446" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-7704" }, { "cve": "CVE-2015-7705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7705" } ], "notes": [ { "category": "general", "text": "The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7705", "url": "https://www.suse.com/security/cve/CVE-2015-7705" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7705", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7705", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 952611 for CVE-2015-7705", "url": "https://bugzilla.suse.com/952611" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7705", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2015-7705" }, { "cve": "CVE-2015-7848", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7848" } ], "notes": [ { "category": "general", "text": "An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP daemon, it leads to an immediate crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7848", "url": "https://www.suse.com/security/cve/CVE-2015-7848" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7848", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7848", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7848", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7848", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-7848" }, { "cve": "CVE-2015-7849", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7849" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to possibly execute arbitrary code or cause a denial of service (crash) via crafted packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7849", "url": "https://www.suse.com/security/cve/CVE-2015-7849" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7849", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7849", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7849", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7849", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-7849" }, { "cve": "CVE-2015-7850", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7850" } ], "notes": [ { "category": "general", "text": "ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (infinite loop or crash) by pointing the key file at the log file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7850", "url": "https://www.suse.com/security/cve/CVE-2015-7850" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7850", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7850", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7850", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7850", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7850" }, { "cve": "CVE-2015-7851", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7851" } ], "notes": [ { "category": "general", "text": "Directory traversal vulnerability in the save_config function in ntpd in ntp_control.c in NTP before 4.2.8p4, when used on systems that do not use \u0027\\\u0027 or \u0027/\u0027 characters for directory separation such as OpenVMS, allows remote authenticated users to overwrite arbitrary files.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7851", "url": "https://www.suse.com/security/cve/CVE-2015-7851" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7851", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7851", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7851", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7851" }, { "cve": "CVE-2015-7852", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7852" } ], "notes": [ { "category": "general", "text": "ntpq in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted mode 6 response packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7852", "url": "https://www.suse.com/security/cve/CVE-2015-7852" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7852", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7852", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7852", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7852", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7852" }, { "cve": "CVE-2015-7853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7853" } ], "notes": [ { "category": "general", "text": "The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7853", "url": "https://www.suse.com/security/cve/CVE-2015-7853" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7853", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7853", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7853", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7853", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2015-7853" }, { "cve": "CVE-2015-7854", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7854" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the password management functionality in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7854", "url": "https://www.suse.com/security/cve/CVE-2015-7854" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7854", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7854", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7854", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7854", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-7854" }, { "cve": "CVE-2015-7855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7855" } ], "notes": [ { "category": "general", "text": "The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (assertion failure) via a 6 or mode 7 packet containing a long data value.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7855", "url": "https://www.suse.com/security/cve/CVE-2015-7855" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7855", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7855", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7855", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7855", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7855" }, { "cve": "CVE-2015-7871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7871" } ], "notes": [ { "category": "general", "text": "Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7871", "url": "https://www.suse.com/security/cve/CVE-2015-7871" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7871", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7871", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 952606 for CVE-2015-7871", "url": "https://bugzilla.suse.com/952606" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7871", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2015-7871" }, { "cve": "CVE-2015-7973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7973" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90, when configured in broadcast mode, allows man-in-the-middle attackers to conduct replay attacks by sniffing the network.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7973", "url": "https://www.suse.com/security/cve/CVE-2015-7973" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7973", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7973", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7973" }, { "cve": "CVE-2015-7974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7974" } ], "notes": [ { "category": "general", "text": "NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a \"skeleton key.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7974", "url": "https://www.suse.com/security/cve/CVE-2015-7974" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7974", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962960 for CVE-2015-7974", "url": "https://bugzilla.suse.com/962960" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7974", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-7974" }, { "cve": "CVE-2015-7975", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7975" } ], "notes": [ { "category": "general", "text": "The nextvar function in NTP before 4.2.8p6 and 4.3.x before 4.3.90 does not properly validate the length of its input, which allows an attacker to cause a denial of service (application crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7975", "url": "https://www.suse.com/security/cve/CVE-2015-7975" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7975", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962988 for CVE-2015-7975", "url": "https://bugzilla.suse.com/962988" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7975", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-7975" }, { "cve": "CVE-2015-7976", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7976" } ], "notes": [ { "category": "general", "text": "The ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows attackers to cause unspecified impact via a crafted filename.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7976", "url": "https://www.suse.com/security/cve/CVE-2015-7976" }, { "category": "external", "summary": "SUSE Bug 962802 for CVE-2015-7976", "url": "https://bugzilla.suse.com/962802" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7976", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-7976" }, { "cve": "CVE-2015-7977", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7977" } ], "notes": [ { "category": "general", "text": "ntpd in NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (NULL pointer dereference) via a ntpdc reslist command.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7977", "url": "https://www.suse.com/security/cve/CVE-2015-7977" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7977", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962970 for CVE-2015-7977", "url": "https://bugzilla.suse.com/962970" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7977", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7977" }, { "cve": "CVE-2015-7978", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7978" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p6 and 4.3.0 before 4.3.90 allows a remote attackers to cause a denial of service (stack exhaustion) via an ntpdc relist command, which triggers recursive traversal of the restriction list.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7978", "url": "https://www.suse.com/security/cve/CVE-2015-7978" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7978", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962970 for CVE-2015-7978", "url": "https://bugzilla.suse.com/962970" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7978", "url": "https://bugzilla.suse.com/962995" }, { "category": "external", "summary": "SUSE Bug 963000 for CVE-2015-7978", "url": "https://bugzilla.suse.com/963000" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7978" }, { "cve": "CVE-2015-7979", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7979" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (client-server association tear down) by sending broadcast packets with invalid authentication to a broadcast client.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7979", "url": "https://www.suse.com/security/cve/CVE-2015-7979" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7979", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962784 for CVE-2015-7979", "url": "https://bugzilla.suse.com/962784" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7979", "url": "https://bugzilla.suse.com/962995" }, { "category": "external", "summary": "SUSE Bug 977459 for CVE-2015-7979", "url": "https://bugzilla.suse.com/977459" }, { "category": "external", "summary": "SUSE Bug 982065 for CVE-2015-7979", "url": "https://bugzilla.suse.com/982065" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7979" }, { "cve": "CVE-2015-8138", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8138" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8138", "url": "https://www.suse.com/security/cve/CVE-2015-8138" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-8138", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-8138", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 963002 for CVE-2015-8138", "url": "https://bugzilla.suse.com/963002" }, { "category": "external", "summary": "SUSE Bug 974668 for CVE-2015-8138", "url": "https://bugzilla.suse.com/974668" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2015-8138", "url": "https://bugzilla.suse.com/977446" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-8138" }, { "cve": "CVE-2015-8158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8158" } ], "notes": [ { "category": "general", "text": "The getresponse function in ntpq in NTP versions before 4.2.8p9 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (infinite loop) via crafted packets with incorrect values.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8158", "url": "https://www.suse.com/security/cve/CVE-2015-8158" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-8158", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962966 for CVE-2015-8158", "url": "https://bugzilla.suse.com/962966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-8158" }, { "cve": "CVE-2016-1547", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1547" } ], "notes": [ { "category": "general", "text": "An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1547", "url": "https://www.suse.com/security/cve/CVE-2016-1547" }, { "category": "external", "summary": "SUSE Bug 962784 for CVE-2016-1547", "url": "https://bugzilla.suse.com/962784" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1547", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977459 for CVE-2016-1547", "url": "https://bugzilla.suse.com/977459" }, { "category": "external", "summary": "SUSE Bug 982064 for CVE-2016-1547", "url": "https://bugzilla.suse.com/982064" }, { "category": "external", "summary": "SUSE Bug 982065 for CVE-2016-1547", "url": "https://bugzilla.suse.com/982065" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-1547" }, { "cve": "CVE-2016-1548", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1548" } ], "notes": [ { "category": "general", "text": "An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-\u003edst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1548", "url": "https://www.suse.com/security/cve/CVE-2016-1548" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2016-1548", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1548", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977461 for CVE-2016-1548", "url": "https://bugzilla.suse.com/977461" }, { "category": "external", "summary": "SUSE Bug 982068 for CVE-2016-1548", "url": "https://bugzilla.suse.com/982068" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-1548" }, { "cve": "CVE-2016-1549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1549" } ], "notes": [ { "category": "general", "text": "A malicious authenticated peer can create arbitrarily-many ephemeral associations in order to win the clock selection algorithm in ntpd in NTP 4.2.8p4 and earlier and NTPsec 3e160db8dc248a0bcb053b56a80167dc742d2b74 and a5fb34b9cc89b92a8fef2f459004865c93bb7f92 and modify a victim\u0027s clock.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1549", "url": "https://www.suse.com/security/cve/CVE-2016-1549" }, { "category": "external", "summary": "SUSE Bug 1083424 for CVE-2016-1549", "url": "https://bugzilla.suse.com/1083424" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1549", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977451 for CVE-2016-1549", "url": "https://bugzilla.suse.com/977451" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-1549" }, { "cve": "CVE-2016-1550", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1550" } ], "notes": [ { "category": "general", "text": "An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest key.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1550", "url": "https://www.suse.com/security/cve/CVE-2016-1550" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1550", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977464 for CVE-2016-1550", "url": "https://bugzilla.suse.com/977464" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-1550" }, { "cve": "CVE-2016-1551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1551" } ], "notes": [ { "category": "general", "text": "ntpd in NTP 4.2.8p3 and NTPsec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 relies on the underlying operating system to protect it from requests that impersonate reference clocks. Because reference clocks are treated like other peers and stored in the same structure, any packet with a source ip address of a reference clock (127.127.1.1 for example) that reaches the receive() function will match that reference clock\u0027s peer record and will be treated as a trusted peer. Any system that lacks the typical martian packet filtering which would block these packets is in danger of having its time controlled by an attacker.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1551", "url": "https://www.suse.com/security/cve/CVE-2016-1551" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1551", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977450 for CVE-2016-1551", "url": "https://bugzilla.suse.com/977450" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-1551" }, { "cve": "CVE-2016-2516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2516" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p7 and 4.3.x before 4.3.92, when mode7 is enabled, allows remote attackers to cause a denial of service (ntpd abort) by using the same IP address multiple times in an unconfig directive.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2516", "url": "https://www.suse.com/security/cve/CVE-2016-2516" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-2516", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977452 for CVE-2016-2516", "url": "https://bugzilla.suse.com/977452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-2516" }, { "cve": "CVE-2016-2517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2517" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (prevent subsequent authentication) by leveraging knowledge of the controlkey or requestkey and sending a crafted packet to ntpd, which changes the value of trustedkey, controlkey, or requestkey. NOTE: this vulnerability exists because of a CVE-2016-2516 regression.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2517", "url": "https://www.suse.com/security/cve/CVE-2016-2517" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-2517", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977455 for CVE-2016-2517", "url": "https://bugzilla.suse.com/977455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-2517" }, { "cve": "CVE-2016-2518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2518" } ], "notes": [ { "category": "general", "text": "The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2518", "url": "https://www.suse.com/security/cve/CVE-2016-2518" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-2518", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977457 for CVE-2016-2518", "url": "https://bugzilla.suse.com/977457" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-2518" }, { "cve": "CVE-2016-2519", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2519" } ], "notes": [ { "category": "general", "text": "ntpd in NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (ntpd abort) by a large request data value, which triggers the ctl_getitem function to return a NULL value.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2519", "url": "https://www.suse.com/security/cve/CVE-2016-2519" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2016-2519", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-2519", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977458 for CVE-2016-2519", "url": "https://bugzilla.suse.com/977458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-2519" }, { "cve": "CVE-2016-4953", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4953" } ], "notes": [ { "category": "general", "text": "ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (ephemeral-association demobilization) by sending a spoofed crypto-NAK packet with incorrect authentication data at a certain time.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4953", "url": "https://www.suse.com/security/cve/CVE-2016-4953" }, { "category": "external", "summary": "SUSE Bug 962784 for CVE-2016-4953", "url": "https://bugzilla.suse.com/962784" }, { "category": "external", "summary": "SUSE Bug 977459 for CVE-2016-4953", "url": "https://bugzilla.suse.com/977459" }, { "category": "external", "summary": "SUSE Bug 982056 for CVE-2016-4953", "url": "https://bugzilla.suse.com/982056" }, { "category": "external", "summary": "SUSE Bug 982065 for CVE-2016-4953", "url": "https://bugzilla.suse.com/982065" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-4953" }, { "cve": "CVE-2016-4954", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4954" } ], "notes": [ { "category": "general", "text": "The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4954", "url": "https://www.suse.com/security/cve/CVE-2016-4954" }, { "category": "external", "summary": "SUSE Bug 982056 for CVE-2016-4954", "url": "https://bugzilla.suse.com/982056" }, { "category": "external", "summary": "SUSE Bug 982066 for CVE-2016-4954", "url": "https://bugzilla.suse.com/982066" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-4954" }, { "cve": "CVE-2016-4955", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4955" } ], "notes": [ { "category": "general", "text": "ntpd in NTP 4.x before 4.2.8p8, when autokey is enabled, allows remote attackers to cause a denial of service (peer-variable clearing and association outage) by sending (1) a spoofed crypto-NAK packet or (2) a packet with an incorrect MAC value at a certain time.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4955", "url": "https://www.suse.com/security/cve/CVE-2016-4955" }, { "category": "external", "summary": "SUSE Bug 982056 for CVE-2016-4955", "url": "https://bugzilla.suse.com/982056" }, { "category": "external", "summary": "SUSE Bug 982067 for CVE-2016-4955", "url": "https://bugzilla.suse.com/982067" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-4955" }, { "cve": "CVE-2016-4956", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4956" } ], "notes": [ { "category": "general", "text": "ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (interleaved-mode transition and time change) via a spoofed broadcast packet. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-1548.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4956", "url": "https://www.suse.com/security/cve/CVE-2016-4956" }, { "category": "external", "summary": "SUSE Bug 977461 for CVE-2016-4956", "url": "https://bugzilla.suse.com/977461" }, { "category": "external", "summary": "SUSE Bug 982056 for CVE-2016-4956", "url": "https://bugzilla.suse.com/982056" }, { "category": "external", "summary": "SUSE Bug 982068 for CVE-2016-4956", "url": "https://bugzilla.suse.com/982068" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-4956" }, { "cve": "CVE-2016-4957", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4957" } ], "notes": [ { "category": "general", "text": "ntpd in NTP before 4.2.8p8 allows remote attackers to cause a denial of service (daemon crash) via a crypto-NAK packet. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-1547.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4957", "url": "https://www.suse.com/security/cve/CVE-2016-4957" }, { "category": "external", "summary": "SUSE Bug 977459 for CVE-2016-4957", "url": "https://bugzilla.suse.com/977459" }, { "category": "external", "summary": "SUSE Bug 982056 for CVE-2016-4957", "url": "https://bugzilla.suse.com/982056" }, { "category": "external", "summary": "SUSE Bug 982064 for CVE-2016-4957", "url": "https://bugzilla.suse.com/982064" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4957" }, { "cve": "CVE-2016-7426", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7426" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7426", "url": "https://www.suse.com/security/cve/CVE-2016-7426" }, { "category": "external", "summary": "SUSE Bug 1011406 for CVE-2016-7426", "url": "https://bugzilla.suse.com/1011406" }, { "category": "external", "summary": "SUSE Bug 1011421 for CVE-2016-7426", "url": "https://bugzilla.suse.com/1011421" }, { "category": "external", "summary": "SUSE Bug 1012330 for CVE-2016-7426", "url": "https://bugzilla.suse.com/1012330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-7426" }, { "cve": "CVE-2016-7427", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7427" } ], "notes": [ { "category": "general", "text": "The broadcast mode replay prevention functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (reject broadcast mode packets) via a crafted broadcast mode packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7427", "url": "https://www.suse.com/security/cve/CVE-2016-7427" }, { "category": "external", "summary": "SUSE Bug 1011390 for CVE-2016-7427", "url": "https://bugzilla.suse.com/1011390" }, { "category": "external", "summary": "SUSE Bug 1011421 for CVE-2016-7427", "url": "https://bugzilla.suse.com/1011421" }, { "category": "external", "summary": "SUSE Bug 1012330 for CVE-2016-7427", "url": "https://bugzilla.suse.com/1012330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-7427" }, { "cve": "CVE-2016-7428", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7428" } ], "notes": [ { "category": "general", "text": "ntpd in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (reject broadcast mode packets) via the poll interval in a broadcast packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7428", "url": "https://www.suse.com/security/cve/CVE-2016-7428" }, { "category": "external", "summary": "SUSE Bug 1011417 for CVE-2016-7428", "url": "https://bugzilla.suse.com/1011417" }, { "category": "external", "summary": "SUSE Bug 1011421 for CVE-2016-7428", "url": "https://bugzilla.suse.com/1011421" }, { "category": "external", "summary": "SUSE Bug 1012330 for CVE-2016-7428", "url": "https://bugzilla.suse.com/1012330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-7428" }, { "cve": "CVE-2016-7429", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7429" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p9 changes the peer structure to the interface it receives the response from a source, which allows remote attackers to cause a denial of service (prevent communication with a source) by sending a response for a source to an interface the source does not use.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7429", "url": "https://www.suse.com/security/cve/CVE-2016-7429" }, { "category": "external", "summary": "SUSE Bug 1011404 for CVE-2016-7429", "url": "https://bugzilla.suse.com/1011404" }, { "category": "external", "summary": "SUSE Bug 1011421 for CVE-2016-7429", "url": "https://bugzilla.suse.com/1011421" }, { "category": "external", "summary": "SUSE Bug 1012330 for CVE-2016-7429", "url": "https://bugzilla.suse.com/1012330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-7429" }, { "cve": "CVE-2016-7431", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7431" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p9 allows remote attackers to bypass the origin timestamp protection mechanism via an origin timestamp of zero. NOTE: this vulnerability exists because of a CVE-2015-8138 regression.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7431", "url": "https://www.suse.com/security/cve/CVE-2016-7431" }, { "category": "external", "summary": "SUSE Bug 1011395 for CVE-2016-7431", "url": "https://bugzilla.suse.com/1011395" }, { "category": "external", "summary": "SUSE Bug 1011421 for CVE-2016-7431", "url": "https://bugzilla.suse.com/1011421" }, { "category": "external", "summary": "SUSE Bug 1012330 for CVE-2016-7431", "url": "https://bugzilla.suse.com/1012330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-7431" }, { "cve": "CVE-2016-7433", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7433" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p9 does not properly perform the initial sync calculations, which allows remote attackers to unspecified impact via unknown vectors, related to a \"root distance that did not include the peer dispersion.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7433", "url": "https://www.suse.com/security/cve/CVE-2016-7433" }, { "category": "external", "summary": "SUSE Bug 1011411 for CVE-2016-7433", "url": "https://bugzilla.suse.com/1011411" }, { "category": "external", "summary": "SUSE Bug 1011421 for CVE-2016-7433", "url": "https://bugzilla.suse.com/1011421" }, { "category": "external", "summary": "SUSE Bug 1012330 for CVE-2016-7433", "url": "https://bugzilla.suse.com/1012330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-7433" }, { "cve": "CVE-2016-7434", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7434" } ], "notes": [ { "category": "general", "text": "The read_mru_list function in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (crash) via a crafted mrulist query.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7434", "url": "https://www.suse.com/security/cve/CVE-2016-7434" }, { "category": "external", "summary": "SUSE Bug 1011398 for CVE-2016-7434", "url": "https://bugzilla.suse.com/1011398" }, { "category": "external", "summary": "SUSE Bug 1011421 for CVE-2016-7434", "url": "https://bugzilla.suse.com/1011421" }, { "category": "external", "summary": "SUSE Bug 1012330 for CVE-2016-7434", "url": "https://bugzilla.suse.com/1012330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-7434" }, { "cve": "CVE-2016-9310", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9310" } ], "notes": [ { "category": "general", "text": "The control mode (mode 6) functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to set or unset traps via a crafted control mode packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9310", "url": "https://www.suse.com/security/cve/CVE-2016-9310" }, { "category": "external", "summary": "SUSE Bug 1011377 for CVE-2016-9310", "url": "https://bugzilla.suse.com/1011377" }, { "category": "external", "summary": "SUSE Bug 1011421 for CVE-2016-9310", "url": "https://bugzilla.suse.com/1011421" }, { "category": "external", "summary": "SUSE Bug 1012330 for CVE-2016-9310", "url": "https://bugzilla.suse.com/1012330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9310" }, { "cve": "CVE-2016-9311", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9311" } ], "notes": [ { "category": "general", "text": "ntpd in NTP before 4.2.8p9, when the trap service is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9311", "url": "https://www.suse.com/security/cve/CVE-2016-9311" }, { "category": "external", "summary": "SUSE Bug 1011377 for CVE-2016-9311", "url": "https://bugzilla.suse.com/1011377" }, { "category": "external", "summary": "SUSE Bug 1011421 for CVE-2016-9311", "url": "https://bugzilla.suse.com/1011421" }, { "category": "external", "summary": "SUSE Bug 1012330 for CVE-2016-9311", "url": "https://bugzilla.suse.com/1012330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9311" } ] }
CERTFR-2017-AVI-365
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Juniper Junos Space. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Juniper Networks | Junos Space | Juniper Junos Space versions antérieures à 17.1R1 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Juniper Junos Space versions ant\u00e9rieures \u00e0 17.1R1", "product": { "name": "Junos Space", "vendor": { "name": "Juniper Networks", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2016-1547", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1547" }, { "name": "CVE-2017-1000369", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000369" }, { "name": "CVE-2017-1000365", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000365" }, { "name": "CVE-2017-1000379", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000379" }, { "name": "CVE-2017-7494", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7494" }, { "name": "CVE-2016-1550", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1550" }, { "name": "CVE-2016-1549", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1549" }, { "name": "CVE-2016-1551", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1551" }, { "name": "CVE-2017-1000366", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000366" }, { "name": "CVE-2017-10612", "url": "https://www.cve.org/CVERecord?id=CVE-2017-10612" }, { "name": "CVE-2016-2516", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2516" }, { "name": "CVE-2016-2518", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2518" }, { "name": "CVE-2017-10624", "url": "https://www.cve.org/CVERecord?id=CVE-2017-10624" }, { "name": "CVE-2017-1000364", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000364" }, { "name": "CVE-2016-2519", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2519" }, { "name": "CVE-2017-1000367", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000367" }, { "name": "CVE-2017-10623", "url": "https://www.cve.org/CVERecord?id=CVE-2017-10623" }, { "name": "CVE-2016-2517", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2517" }, { "name": "CVE-2017-1000371", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000371" }, { "name": "CVE-2016-1548", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1548" } ], "initial_release_date": "2017-10-18T00:00:00", "last_revision_date": "2017-10-18T00:00:00", "links": [], "reference": "CERTFR-2017-AVI-365", "revisions": [ { "description": "Version initiale", "revision_date": "2017-10-18T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Junos\nSpace. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, une ex\u00e9cution de code\narbitraire et un d\u00e9ni de service \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Junos Space", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10826 du 18 octobre 2017", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10826\u0026cat=SIRT_1\u0026actp=LIST" } ] }
CERTFR-2022-AVI-124
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Système affecté | Lien vers l'avis éditeur |
---|---|
Advantage Navigator Energy & Sustainability | Lien |
Advantage Navigator Software Proxy V6 | Lien |
Building Operator Discovery Distribution for the Connect X200 Gateway | Lien |
Building Operator Discovery Distribution for the Connect X300 Gateway | Lien |
Building Twin - 360° Viewer | Lien |
Capital | Lien |
Cerberus DMS | Lien |
CloudConnect 712 | Lien |
COMOS | Lien |
COMOS V10.2 | Lien |
COMOS V10.3 | Lien |
COMOS V10.4 | Lien |
cRSP Operator Client Starter | Lien |
cRSP | Lien |
Desigo CC | Lien |
Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
E-Car OC Cloud Application | Lien |
Energy Engage | Lien |
EnergyIP Prepay V3.7 | Lien |
EnergyIP Prepay V3.8 | Lien |
EnergyIP | Lien |
Enlighted Amaze | Lien |
Enlighted Where | Lien |
Geolus Shape Search V10 | Lien |
Geolus Shape Search V11 | Lien |
GMA-Manager | Lien |
HEEDS Connect | Lien |
HES UDIS | Lien |
IE/AS-i Link PN IO | Lien |
IE/PB-Link (incl. SIPLUS NET variants) | Lien |
IE/PB LINK PN IO (incl. SIPLUS NET variants) | Lien |
Industrial Edge Hub | Lien |
Industrial Edge Management App (IEM-App) | Lien |
Industrial Edge Management OS (IEM-OS) | Lien |
jROS for Spectrum Power 4 | Lien |
jROS for Spectrum Power 7 | Lien |
JT2Go | Lien |
KTK ATE530S | Lien |
LOGO! CMR2020 | Lien |
LOGO! CMR2040 | Lien |
Mendix Applications | Lien |
MindSphere App Management Cockpits (Developer& Operator) | Lien |
MindSphere Asset Manager | Lien |
Mindsphere Cloud Foundry | Lien |
Mindsphere Cloud Platform | Lien |
MindSphere IAM (User Management/ Settings) | Lien |
MindSphere Integrated Data Lake | Lien |
MindSphere Notification Service | Lien |
MindSphere Predictive Learning | Lien |
MindSphere Usage Transparency Service | Lien |
MindSphere Visual Explorer | Lien |
NXpower Monitor | Lien |
NX | Lien |
Opcenter EX CP Process Automation Control | Lien |
Opcenter Execution Core Process Automation Control | Lien |
Opcenter Intelligence | Lien |
Operation Scheduler | Lien |
PROFINET Driver for Controller | Lien |
PSS(R)CAPE | Lien |
RFID 181EIP | Lien |
ROX II | Lien |
RUGGEDCOM APE1404 Linux | Lien |
RUGGEDCOM CROSSBOW Station Access Controller | Lien |
RUGGEDCOM RCM1224 | Lien |
RUGGEDCOM RM1224 LTE(4G) EU | Lien |
RUGGEDCOM RM1224 LTE(4G) EU | Lien |
RUGGEDCOM RM1224 LTE(4G) NAM | Lien |
RUGGEDCOM RM1224 LTE(4G) NAM | Lien |
RUGGEDCOM RM1224 | Lien |
RUGGEDCOM RM1224 | Lien |
RUGGEDCOM RM1224 | Lien |
RUGGEDCOM ROX MX5000RE | Lien |
RUGGEDCOM ROX MX5000 | Lien |
RUGGEDCOM ROX RX1400 | Lien |
RUGGEDCOM ROX RX1500 | Lien |
RUGGEDCOM ROX RX1501 | Lien |
RUGGEDCOM ROX RX1510 | Lien |
RUGGEDCOM ROX RX1511 | Lien |
RUGGEDCOM ROX RX1512 | Lien |
RUGGEDCOM ROX RX1524 | Lien |
RUGGEDCOM ROX RX1536 | Lien |
RUGGEDCOM ROX RX5000 | Lien |
RUGGEDCOM RX1400 VPE Debian Linux | Lien |
RUGGEDCOM RX1400 VPE Linux CloudConnect | Lien |
SCALANCE LPE9403 | Lien |
SCALANCE M-800 / S615 | Lien |
SCALANCE M-800 | Lien |
SCALANCE M804PB | Lien |
SCALANCE M804PB | Lien |
SCALANCE M804PB | Lien |
SCALANCE M804PB | Lien |
SCALANCE M804PB | Lien |
SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
SCALANCE M812-1 ADSL-Router | Lien |
SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
SCALANCE M816-1 ADSL-Router | Lien |
SCALANCE M826-2 SHDSL-Router | Lien |
SCALANCE M826-2 SHDSL-Router | Lien |
SCALANCE M826-2 SHDSL-Router | Lien |
SCALANCE M826-2 SHDSL-Router | Lien |
SCALANCE M826-2 SHDSL-Router | Lien |
SCALANCE M874-2 | Lien |
SCALANCE M874-2 | Lien |
SCALANCE M874-2 | Lien |
SCALANCE M874-2 | Lien |
SCALANCE M874-2 | Lien |
SCALANCE M874-3 | Lien |
SCALANCE M874-3 | Lien |
SCALANCE M874-3 | Lien |
SCALANCE M874-3 | Lien |
SCALANCE M874-3 | Lien |
SCALANCE M875 | Lien |
SCALANCE M876-3 (ROK) | Lien |
SCALANCE M876-3 (ROK) | Lien |
SCALANCE M876-3 (ROK) | Lien |
SCALANCE M876-3 (ROK) | Lien |
SCALANCE M876-3 (ROK) | Lien |
SCALANCE M876-3 | Lien |
SCALANCE M876-3 | Lien |
SCALANCE M876-3 | Lien |
SCALANCE M876-3 | Lien |
SCALANCE M876-3 | Lien |
SCALANCE M876-4 (EU) | Lien |
SCALANCE M876-4 (EU) | Lien |
SCALANCE M876-4 (EU) | Lien |
SCALANCE M876-4 (EU) | Lien |
SCALANCE M876-4 (EU) | Lien |
SCALANCE M876-4 (NAM) | Lien |
SCALANCE M876-4 (NAM) | Lien |
SCALANCE M876-4 (NAM) | Lien |
SCALANCE M876-4 (NAM) | Lien |
SCALANCE M876-4 (NAM) | Lien |
SCALANCE MUM856-1 (EU) | Lien |
SCALANCE MUM856-1 (EU) | Lien |
SCALANCE MUM856-1 (RoW) | Lien |
SCALANCE MUM856-1 (RoW) | Lien |
SCALANCE S602 | Lien |
SCALANCE S602 | Lien |
SCALANCE S602 | Lien |
SCALANCE S612 | Lien |
SCALANCE S612 | Lien |
SCALANCE S612 | Lien |
SCALANCE S615 | Lien |
SCALANCE S615 | Lien |
SCALANCE S615 | Lien |
SCALANCE S615 | Lien |
SCALANCE S615 | Lien |
SCALANCE S623 | Lien |
SCALANCE S623 | Lien |
SCALANCE S623 | Lien |
SCALANCE S627-2M | Lien |
SCALANCE S627-2M | Lien |
SCALANCE S627-2M | Lien |
SCALANCE SC622-2C | Lien |
SCALANCE SC622-2C | Lien |
SCALANCE SC622-2C | Lien |
SCALANCE SC622-2C | Lien |
SCALANCE SC632-2C | Lien |
SCALANCE SC632-2C | Lien |
SCALANCE SC632-2C | Lien |
SCALANCE SC632-2C | Lien |
SCALANCE SC636-2C | Lien |
SCALANCE SC636-2C | Lien |
SCALANCE SC636-2C | Lien |
SCALANCE SC636-2C | Lien |
SCALANCE SC642-2C | Lien |
SCALANCE SC642-2C | Lien |
SCALANCE SC642-2C | Lien |
SCALANCE SC642-2C | Lien |
SCALANCE SC646-2C | Lien |
SCALANCE SC646-2C | Lien |
SCALANCE SC646-2C | Lien |
SCALANCE SC646-2C | Lien |
SCALANCE W-1700 IEEE 802.11ac family | Lien |
SCALANCE W-1700 IEEE 802.11ac family | Lien |
SCALANCE W-1700 IEEE 802.11ac family | Lien |
SCALANCE W1748-1 M12 | Lien |
SCALANCE W1748-1 M12 | Lien |
SCALANCE W1750D | Lien |
SCALANCE W1750D | Lien |
SCALANCE W1788-1 M12 | Lien |
SCALANCE W1788-1 M12 | Lien |
SCALANCE W1788-2 EEC M12 | Lien |
SCALANCE W1788-2 EEC M12 | Lien |
SCALANCE W1788-2IA M12 | Lien |
SCALANCE W1788-2IA M12 | Lien |
SCALANCE W1788-2 M12 | Lien |
SCALANCE W1788-2 M12 | Lien |
SCALANCE W-700 IEEE 802.11n family | Lien |
SCALANCE W-700 IEEE 802.11n family | Lien |
SCALANCE W-700 IEEE 802.11n family | Lien |
SCALANCE W-700 IEEE 802.11n family | Lien |
SCALANCE W700 | Lien |
SCALANCE W721-1 RJ45 | Lien |
SCALANCE W721-1 RJ45 | Lien |
SCALANCE W722-1 RJ45 | Lien |
SCALANCE W722-1 RJ45 | Lien |
SCALANCE W734-1 RJ45 | Lien |
SCALANCE W734-1 RJ45 | Lien |
SCALANCE W734-1 RJ45 (USA) | Lien |
SCALANCE W734-1 RJ45 (USA) | Lien |
SCALANCE W738-1 M12 | Lien |
SCALANCE W738-1 M12 | Lien |
SCALANCE W748-1 M12 | Lien |
SCALANCE W748-1 M12 | Lien |
SCALANCE W748-1 RJ45 | Lien |
SCALANCE W748-1 RJ45 | Lien |
SCALANCE W761-1 RJ45 | Lien |
SCALANCE W761-1 RJ45 | Lien |
SCALANCE W774-1 M12 EEC | Lien |
SCALANCE W774-1 M12 EEC | Lien |
SCALANCE W774-1 RJ45 | Lien |
SCALANCE W774-1 RJ45 | Lien |
SCALANCE W774-1 RJ45 (USA) | Lien |
SCALANCE W774-1 RJ45 (USA) | Lien |
SCALANCE W778-1 M12 EEC | Lien |
SCALANCE W778-1 M12 EEC | Lien |
SCALANCE W778-1 M12 EEC (USA) | Lien |
SCALANCE W778-1 M12 EEC (USA) | Lien |
SCALANCE W778-1 M12 | Lien |
SCALANCE W778-1 M12 | Lien |
SCALANCE W786-1 RJ45 | Lien |
SCALANCE W786-1 RJ45 | Lien |
SCALANCE W786-2IA RJ45 | Lien |
SCALANCE W786-2IA RJ45 | Lien |
SCALANCE W786-2 RJ45 | Lien |
SCALANCE W786-2 RJ45 | Lien |
SCALANCE W786-2 SFP | Lien |
SCALANCE W786-2 SFP | Lien |
SCALANCE W788-1 M12 | Lien |
SCALANCE W788-1 M12 | Lien |
SCALANCE W788-1 RJ45 | Lien |
SCALANCE W788-1 RJ45 | Lien |
SCALANCE W788-2 M12 EEC | Lien |
SCALANCE W788-2 M12 EEC | Lien |
SCALANCE W788-2 M12 | Lien |
SCALANCE W788-2 M12 | Lien |
SCALANCE W788-2 RJ45 | Lien |
SCALANCE W788-2 RJ45 | Lien |
SCALANCE WAM763-1 | Lien |
SCALANCE WAM766-1 6GHz | Lien |
SCALANCE WAM766-1 6GHz | Lien |
SCALANCE WAM766-1 EEC 6GHz | Lien |
SCALANCE WAM766-1 EEC 6GHz | Lien |
SCALANCE WAM766-1 EEC | Lien |
SCALANCE WAM766-1 EEC | Lien |
SCALANCE WAM766-1 | Lien |
SCALANCE WAM766-1 | Lien |
SCALANCE WLC711 | Lien |
SCALANCE WLC712 | Lien |
SCALANCE WUM763-1 | Lien |
SCALANCE WUM766-1 6GHz | Lien |
SCALANCE WUM766-1 6GHz | Lien |
SCALANCE WUM766-1 | Lien |
SCALANCE WUM766-1 | Lien |
SCALANCE X200-4 P IRT | Lien |
SCALANCE X200-4 P IRT | Lien |
SCALANCE X-200IRT (incl. SIPLUS NET variants) | Lien |
SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
SCALANCE X201-3P IRT PRO | Lien |
SCALANCE X201-3P IRT PRO | Lien |
SCALANCE X201-3P IRT | Lien |
SCALANCE X201-3P IRT | Lien |
SCALANCE X202-2 IRT | Lien |
SCALANCE X202-2 IRT | Lien |
SCALANCE X202-2P IRT (incl. SIPLUS NET variant) | Lien |
SCALANCE X202-2P IRT (incl. SIPLUS NET variant) | Lien |
SCALANCE X202-2P IRT PRO | Lien |
SCALANCE X202-2P IRT PRO | Lien |
SCALANCE X204-2FM | Lien |
SCALANCE X204-2FM | Lien |
SCALANCE X204-2 (incl. SIPLUS NET variant) | Lien |
SCALANCE X204-2LD (incl. SIPLUS NET variant) | Lien |
SCALANCE X204-2LD | Lien |
SCALANCE X204-2LD TS | Lien |
SCALANCE X204-2LD TS | Lien |
SCALANCE X204-2 | Lien |
SCALANCE X204-2TS | Lien |
SCALANCE X204-2TS | Lien |
SCALANCE X204 IRT PRO | Lien |
SCALANCE X204 IRT PRO | Lien |
SCALANCE X204 IRT | Lien |
SCALANCE X204 IRT | Lien |
SCALANCE X204RNA EEC (HSR) | Lien |
SCALANCE X204RNA EEC (HSR) | Lien |
SCALANCE X204RNA EEC (PRP/HSR) | Lien |
SCALANCE X204RNA EEC (PRP/HSR) | Lien |
SCALANCE X204RNA EEC (PRP) | Lien |
SCALANCE X204RNA EEC (PRP) | Lien |
SCALANCE X204RNA (HSR) | Lien |
SCALANCE X204RNA (HSR) | Lien |
SCALANCE X204RNA (PRP) | Lien |
SCALANCE X204RNA (PRP) | Lien |
SCALANCE X206-1LD (incl. SIPLUS NET variant) | Lien |
SCALANCE X206-1LD | Lien |
SCALANCE X206-1 | Lien |
SCALANCE X206-1 | Lien |
SCALANCE X208 (incl. SIPLUS NET variant) | Lien |
SCALANCE X208PRO | Lien |
SCALANCE X208PRO | Lien |
SCALANCE X208 | Lien |
SCALANCE X212-2LD | Lien |
SCALANCE X212-2LD | Lien |
SCALANCE X212-2 | Lien |
SCALANCE X212-2 | Lien |
SCALANCE X216 | Lien |
SCALANCE X216 | Lien |
SCALANCE X224 | Lien |
SCALANCE X224 | Lien |
SCALANCE X-300 (incl. X408 and SIPLUS NET variants) | Lien |
SCALANCE X-300 switch family (incl. SIPLUS NET variants) | Lien |
SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) | Lien |
SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) | Lien |
SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) | Lien |
SCALANCE X302-7 EEC (230V coated) | Lien |
SCALANCE X302-7 EEC (230V) | Lien |
SCALANCE X302-7 EEC (24V coated) | Lien |
SCALANCE X302-7 EEC (24V) | Lien |
SCALANCE X302-7 EEC (2x 230V coated) | Lien |
SCALANCE X302-7 EEC (2x 230V) | Lien |
SCALANCE X302-7 EEC (2x 24V coated) | Lien |
SCALANCE X302-7 EEC (2x 24V) | Lien |
SCALANCE X302-7EEC | Lien |
SCALANCE X304-2FE | Lien |
SCALANCE X304-2FE | Lien |
SCALANCE X306-1LD FE | Lien |
SCALANCE X306-1LDFE | Lien |
SCALANCE X307-2 EEC (230V coated) | Lien |
SCALANCE X307-2 EEC (230V) | Lien |
SCALANCE X307-2 EEC (24V coated) | Lien |
SCALANCE X307-2 EEC (24V) | Lien |
SCALANCE X307-2 EEC (2x 230V coated) | Lien |
SCALANCE X307-2 EEC (2x 230V) | Lien |
SCALANCE X307-2 EEC (2x 24V coated) | Lien |
SCALANCE X307-2 EEC (2x 24V) | Lien |
SCALANCE X307-2EEC | Lien |
SCALANCE X307-3LD | Lien |
SCALANCE X307-3LD | Lien |
SCALANCE X307-3 | Lien |
SCALANCE X307-3 | Lien |
SCALANCE X308-2 (incl. SIPLUS NET variant) | Lien |
SCALANCE X308-2LD | Lien |
SCALANCE X308-2LD | Lien |
SCALANCE X308-2LH+ | Lien |
SCALANCE X308-2LH | Lien |
SCALANCE X308-2LH+ | Lien |
SCALANCE X308-2LH | Lien |
SCALANCE X308-2M PoE | Lien |
SCALANCE X308-2M PoE | Lien |
SCALANCE X308-2M | Lien |
SCALANCE X308-2M | Lien |
SCALANCE X308-2M TS | Lien |
SCALANCE X308-2M TS | Lien |
SCALANCE X308-2 | Lien |
SCALANCE X310FE | Lien |
SCALANCE X310FE | Lien |
SCALANCE X310 | Lien |
SCALANCE X310 | Lien |
SCALANCE X320-1-2LD FE | Lien |
SCALANCE X320-1 FE | Lien |
SCALANCE X320-1FE | Lien |
SCALANCE X320-3LDFE | Lien |
SCALANCE X408-2 | Lien |
SCALANCE X408 | Lien |
SCALANCE X414 | Lien |
SCALANCE XB-200 | Lien |
SCALANCE XB-200 | Lien |
SCALANCE XB-200 | Lien |
SCALANCE XC-200 | Lien |
SCALANCE XC-200 | Lien |
SCALANCE XC-200 | Lien |
SCALANCE XF-200BA | Lien |
SCALANCE XF-200BA | Lien |
SCALANCE XF-200BA | Lien |
SCALANCE XF201-3P IRT | Lien |
SCALANCE XF201-3P IRT | Lien |
SCALANCE XF202-2P IRT | Lien |
SCALANCE XF202-2P IRT | Lien |
SCALANCE XF204-2BA IRT | Lien |
SCALANCE XF204-2BA IRT | Lien |
SCALANCE XF204-2 (incl. SIPLUS NET variant) | Lien |
SCALANCE XF204-2 | Lien |
SCALANCE XF204 IRT | Lien |
SCALANCE XF204 IRT | Lien |
SCALANCE XF204 | Lien |
SCALANCE XF204 | Lien |
SCALANCE XF206-1 | Lien |
SCALANCE XF206-1 | Lien |
SCALANCE XF208 | Lien |
SCALANCE XF208 | Lien |
SCALANCE XM-400 Family | Lien |
SCALANCE XM400 | Lien |
SCALANCE XM-400 | Lien |
SCALANCE XM-400 | Lien |
SCALANCE XP-200 | Lien |
SCALANCE XP-200 | Lien |
SCALANCE XP-200 | Lien |
SCALANCE XR-300WG | Lien |
SCALANCE XR-300WG | Lien |
SCALANCE XR-300WG | Lien |
SCALANCE XR324-12M (230V ports on front) | Lien |
SCALANCE XR324-12M (230V ports on rear) | Lien |
SCALANCE XR324-12M (24V ports on front) | Lien |
SCALANCE XR324-12M (24V ports on rear) | Lien |
SCALANCE XR324-12M | Lien |
SCALANCE XR324-12M TS (24V) | Lien |
SCALANCE XR324-12M TS | Lien |
SCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on front) | Lien |
SCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on rear) | Lien |
SCALANCE XR324-4M EEC (24V ports on front) | Lien |
SCALANCE XR324-4M EEC (24V ports on rear) | Lien |
SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on front) | Lien |
SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on rear) | Lien |
SCALANCE XR324-4M EEC | Lien |
SCALANCE XR324-4M PoE | Lien |
SCALANCE XR324-4M PoE TS | Lien |
SCALANCE XR-500 Family | Lien |
SCALANCE XR-500 Family | Lien |
SCALANCE XR500 | Lien |
SCALANCE XR-500 | Lien |
SENTRON 3VA COM100/800 | Lien |
SENTRON 3VA DSP800 | Lien |
SENTRON PAC2200 (with CLP Approval) | Lien |
SENTRON PAC2200 (with MID Approval) | Lien |
SENTRON PAC2200 (without MID Approval) | Lien |
SENTRON PAC3200 | Lien |
SENTRON PAC3200T | Lien |
SENTRON PAC3220 | Lien |
SENTRON PAC4200 | Lien |
SENTRON powermanager V4 | Lien |
SICAM 230 | Lien |
SICAM TOOLBOX II | Lien |
SIDOOR ATD430W | Lien |
SIDOOR ATE530S COATED | Lien |
SIDOOR ATE531S | Lien |
SIGUARD DSA | Lien |
SIMATIC CFU PA | Lien |
SIMATIC CFU PA | Lien |
SIMATIC Cloud Connect 7 CC712 | Lien |
SIMATIC Cloud Connect 7 CC716 | Lien |
SIMATIC CM 1542-1 | Lien |
SIMATIC CM 1542-1 | Lien |
SIMATIC CM 1542-1 | Lien |
SIMATIC CM 1542SP-1 | Lien |
SIMATIC Compact Field Unit | Lien |
SIMATIC CP 1242-7C | Lien |
SIMATIC CP 1242-7 GPRS V2 | Lien |
SIMATIC CP 1242-7 GPRS V2 | Lien |
SIMATIC CP 1242-7 GPRS V2 | Lien |
SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) | Lien |
SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) | Lien |
SIMATIC CP 1243-1 (incl. SIPLUS variants) | Lien |
SIMATIC CP 1243-1 (incl. SIPLUS variants) | Lien |
SIMATIC CP 1243-1 IRC (incl. SIPLUS variants) | Lien |
SIMATIC CP 1243-1 | Lien |
SIMATIC CP 1243-1 | Lien |
SIMATIC CP 1243-1 | Lien |
SIMATIC CP 1243-7 LTE EU | Lien |
SIMATIC CP 1243-7 LTE EU | Lien |
SIMATIC CP 1243-7 LTE EU | Lien |
SIMATIC CP 1243-7 LTE EU | Lien |
SIMATIC CP 1243-7 LTE US | Lien |
SIMATIC CP 1243-7 LTE US | Lien |
SIMATIC CP 1243-7 LTE US | Lien |
SIMATIC CP 1243-7 LTE US | Lien |
SIMATIC CP 1243-8 IRC | Lien |
SIMATIC CP 1243-8 IRC | Lien |
SIMATIC CP 1243-8 IRC | Lien |
SIMATIC CP 1243-8 IRC | Lien |
SIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants) | Lien |
SIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants) | Lien |
SIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants) | Lien |
SIMATIC CP 1542SP-1 IRC | Lien |
SIMATIC CP 1542SP-1 | Lien |
SIMATIC CP 1542SP-1 | Lien |
SIMATIC CP 1542SP-1 | Lien |
SIMATIC CP 1543-1 (incl. SIPLUS variants) | Lien |
SIMATIC CP 1543-1 | Lien |
SIMATIC CP 1543-1 | Lien |
SIMATIC CP 1543-1 | Lien |
SIMATIC CP 1543-1 | Lien |
SIMATIC CP 1543SP-1 (incl. SIPLUS variants) | Lien |
SIMATIC CP 1543SP-1 (incl. SIPLUS variants) | Lien |
SIMATIC CP 1543SP-1 | Lien |
SIMATIC CP 1543SP-1 | Lien |
SIMATIC CP 1545-1 | Lien |
SIMATIC CP 1545-1 | Lien |
SIMATIC CP 1545-1 | Lien |
SIMATIC CP 1604 | Lien |
SIMATIC CP 1604 | Lien |
SIMATIC CP 1616 and CP 1604 | Lien |
SIMATIC CP1616/CP1604 | Lien |
SIMATIC CP 1616 | Lien |
SIMATIC CP 1616 | Lien |
SIMATIC CP 1623 | Lien |
SIMATIC CP 1623 | Lien |
SIMATIC CP1626 | Lien |
SIMATIC CP 1626 | Lien |
SIMATIC CP 1628 | Lien |
SIMATIC CP 1628 | Lien |
SIMATIC CP 343-1 Advanced (incl. SIPLUS variants) | Lien |
SIMATIC CP 343-1 Advanced (incl. SIPLUS variants) | Lien |
SIMATIC CP 343-1 Advanced | Lien |
SIMATIC CP 343-1 Advanced | Lien |
SIMATIC CP 343-1 Advanced | Lien |
SIMATIC CP 343-1 ERPC | Lien |
SIMATIC CP 343-1 (incl. SIPLUS variants) | Lien |
SIMATIC CP 343-1 Lean (incl. SIPLUS variants) | Lien |
SIMATIC CP 343-1 Lean | Lien |
SIMATIC CP 343-1 | Lien |
SIMATIC CP 442-1 RNA | Lien |
SIMATIC CP 442-1 RNA | Lien |
SIMATIC CP 443-1 Advanced (incl. SIPLUS variants) | Lien |
SIMATIC CP 443-1 Advanced (incl. SIPLUS variants) | Lien |
SIMATIC CP 443-1 Advanced (incl. SIPLUS variants) | Lien |
SIMATIC CP 443-1 Advanced | Lien |
SIMATIC CP 443-1 Advanced | Lien |
SIMATIC CP 443-1 Advanced | Lien |
SIMATIC CP 443-1 (incl. SIPLUS variants) | Lien |
SIMATIC CP 443-1 (incl. SIPLUS variants) | Lien |
SIMATIC CP 443-1 (incl. SIPLUS variants) | Lien |
SIMATIC CP 443-1 OPC UA | Lien |
SIMATIC CP 443-1 OPC UA | Lien |
SIMATIC CP 443-1 OPC UA | Lien |
SIMATIC CP 443-1 OPC UA | Lien |
SIMATIC CP 443-1 OPC UA | Lien |
SIMATIC CP 443-1 OPC UA | Lien |
SIMATIC CP 443-1 OPC UA | Lien |
SIMATIC CP 443-1 RNA | Lien |
SIMATIC CP 443-1 RNA | Lien |
SIMATIC CP 443-1 | Lien |
SIMATIC CP 443-1 | Lien |
SIMATIC CP 443-1 | Lien |
SIMATIC DK-16xx PN IO | Lien |
SIMATIC Drive Controller family | Lien |
SIMATIC Drive Controller family | Lien |
SIMATIC ET200AL IM 157-1 PN | Lien |
SIMATIC ET200AL | Lien |
SIMATIC ET200AL | Lien |
SIMATIC ET200AL | Lien |
SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
SIMATIC ET200ecoPN: IO-Link Master | Lien |
SIMATIC ET200ecoPN: IO-Link Master | Lien |
SIMATIC ET200ecoPN: IO-Link Master | Lien |
SIMATIC ET200ecoPN: IO-Link Master | Lien |
SIMATIC ET200ecoPN: IO-Link Master | Lien |
SIMATIC ET200M IM153-4 PN IO HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200M IM153-4 PN IO ST (incl. SIPLUS variants) | Lien |
SIMATIC ET200M (incl. SIPLUS variants) | Lien |
SIMATIC ET200M (incl. SIPLUS variants) | Lien |
SIMATIC ET200M (incl. SIPLUS variants) | Lien |
SIMATIC ET200M (incl. SIPLUS variants) | Lien |
SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants) | Lien |
SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants) | Lien |
SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants) | Lien |
SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
SIMATIC ET200pro IM 154-3 PN HF | Lien |
SIMATIC ET200pro IM 154-4 PN HF | Lien |
SIMATIC ET200pro | Lien |
SIMATIC ET200pro | Lien |
SIMATIC ET200pro | Lien |
SIMATIC ET200pro | Lien |
SIMATIC ET200S (incl. SIPLUS variants) | Lien |
SIMATIC ET200S (incl. SIPLUS variants) | Lien |
SIMATIC ET200S (incl. SIPLUS variants) | Lien |
SIMATIC ET200S (incl. SIPLUS variants) | Lien |
SIMATIC ET200S (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 MF HF | Lien |
SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN Basic (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP (incl. SIPLUS variants except IM155-6 PN ST and IM155-6 PN HF) | Lien |
SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) | Lien |
SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) | Lien |
SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) | Lien |
SIMATIC Field PG M5 | Lien |
SIMATIC Field PG M6 | Lien |
SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
SIMATIC HMI Comfort Panels HMI Multi Panels HMI Mobile Panels (incl. SIPLUS variants) | Lien |
SIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F | Lien |
SIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F | Lien |
SIMATIC HMI KTP Mobile Panels | Lien |
SIMATIC HMI KTP Mobile Panels | Lien |
SIMATIC IE/PB-LINK V3 | Lien |
SIMATIC Information Server | Lien |
SIMATIC IPC1047E | Lien |
SIMATIC IPC1047 | Lien |
SIMATIC IPC127E | Lien |
SIMATIC IPC427E | Lien |
SIMATIC IPC477E Pro | Lien |
SIMATIC IPC477E | Lien |
SIMATIC IPC527G | Lien |
SIMATIC IPC547G | Lien |
SIMATIC IPC627E | Lien |
SIMATIC IPC647D | Lien |
SIMATIC IPC647E | Lien |
SIMATIC IPC647E | Lien |
SIMATIC IPC677E | Lien |
SIMATIC IPC847D | Lien |
SIMATIC IPC847E | Lien |
SIMATIC IPC847E | Lien |
SIMATIC IPC DiagMonitor | Lien |
SIMATIC IPC DiagMonitor | Lien |
SIMATIC IPC Support Package for VxWorks | Lien |
SIMATIC ITC1500 PRO | Lien |
SIMATIC ITC1500 | Lien |
SIMATIC ITC1900 PRO | Lien |
SIMATIC ITC1900 | Lien |
SIMATIC ITC2200 PRO | Lien |
SIMATIC ITC2200 | Lien |
SIMATIC ITP1000 | Lien |
SIMATIC Logon | Lien |
SIMATIC MICRO-DRIVE PDC | Lien |
SIMATIC MV400 family | Lien |
SIMATIC MV400 | Lien |
SIMATIC MV540 H (6GF3540-0GE10) | Lien |
SIMATIC MV540 H | Lien |
SIMATIC MV540 H | Lien |
SIMATIC MV540 S (6GF3540-0CD10) | Lien |
SIMATIC MV540 S | Lien |
SIMATIC MV540 S | Lien |
SIMATIC MV550 H (6GF3550-0GE10) | Lien |
SIMATIC MV550 H | Lien |
SIMATIC MV550 H | Lien |
SIMATIC MV550 S (6GF3550-0CD10) | Lien |
SIMATIC MV550 S | Lien |
SIMATIC MV550 S | Lien |
SIMATIC MV560 U (6GF3560-0LE10) | Lien |
SIMATIC MV560 U | Lien |
SIMATIC MV560 U | Lien |
SIMATIC MV560 X (6GF3560-0HE10) | Lien |
SIMATIC MV560 X | Lien |
SIMATIC MV560 X | Lien |
SIMATIC NET CP 1604 | Lien |
SIMATIC NET CP 1616 | Lien |
SIMATIC NET DK-16xx PN IO | Lien |
SIMATIC NET PC Software | Lien |
SIMATIC PCS 7 TeleControl | Lien |
SIMATIC PCS 7 V8.2 and earlier | Lien |
SIMATIC PCS 7 V8.2 and earlier | Lien |
SIMATIC PCS 7 V9.0 | Lien |
SIMATIC PCS 7 V9.0 | Lien |
SIMATIC PCS 7 V9.1 | Lien |
SIMATIC PCS 7 V9.1 | Lien |
SIMATIC PCS neo | Lien |
SIMATIC PCS neo | Lien |
SIMATIC PCS neo | Lien |
SIMATIC PDM | Lien |
SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant) | Lien |
SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant) | Lien |
SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
SIMATIC Power Line Booster PLB Base Module | Lien |
SIMATIC Process Historian (incl. Process Historian OPC UA Server) | Lien |
SIMATIC Process Historian OPC UA Server | Lien |
SIMATIC Process Historian OPC UA Server | Lien |
SIMATIC PROFINET Driver | Lien |
SIMATIC PROFINET Driver | Lien |
SIMATIC RF166C | Lien |
SIMATIC RF180C | Lien |
SIMATIC RF180C | Lien |
SIMATIC RF182C | Lien |
SIMATIC RF182C | Lien |
SIMATIC RF182C | Lien |
SIMATIC RF185C | Lien |
SIMATIC RF185C | Lien |
SIMATIC RF185C | Lien |
SIMATIC RF186CI | Lien |
SIMATIC RF186CI | Lien |
SIMATIC RF186C | Lien |
SIMATIC RF186C | Lien |
SIMATIC RF186C | Lien |
SIMATIC RF188CI | Lien |
SIMATIC RF188CI | Lien |
SIMATIC RF188C | Lien |
SIMATIC RF188C | Lien |
SIMATIC RF188C | Lien |
SIMATIC RF188C | Lien |
SIMATIC RF360R | Lien |
SIMATIC RF600 family | Lien |
SIMATIC RF600R | Lien |
SIMATIC RF600R | Lien |
SIMATIC RF600 | Lien |
SIMATIC RF650R | Lien |
SIMATIC RF680R | Lien |
SIMATIC RF685R | Lien |
SIMATIC RTU3010C | Lien |
SIMATIC RTU3030C | Lien |
SIMATIC RTU3031C | Lien |
SIMATIC RTU3041C | Lien |
SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant) | Lien |
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant) | Lien |
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant) | Lien |
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP | Lien |
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP | Lien |
SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
SIMATIC S7-1500 Software Controller (incl. F) | Lien |
SIMATIC S7-1500 Software Controller | Lien |
SIMATIC S7-1500 Software Controller | Lien |
SIMATIC S7-1500 Software Controller | Lien |
SIMATIC S7-1500 Software Controller | Lien |
SIMATIC S7-1500 Software Controller | Lien |
SIMATIC S7-1500 Software Controller | Lien |
SIMATIC S7-200 SMART | Lien |
SIMATIC S7-200 SMART | Lien |
SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
SIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 PN/DP V6 CPU family and below (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 PN/DP V6 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 PN/DP V7 and below CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-410 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-410 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-PLCSIM Advanced | Lien |
SIMATIC S7-PLCSIM Advanced | Lien |
SIMATIC TDC CP51M1 | Lien |
SIMATIC TDC CP51M1 | Lien |
SIMATIC TDC CP51M1 | Lien |
SIMATIC TDC CP51M1 | Lien |
SIMATIC TDC CPU555 | Lien |
SIMATIC TDC CPU555 | Lien |
SIMATIC TDC CPU555 | Lien |
SIMATIC TDC CPU555 | Lien |
SIMATIC Teleservice Adapter IE Advanced | Lien |
SIMATIC Teleservice Adapter IE Advanced | Lien |
SIMATIC Teleservice Adapter IE Advanced | Lien |
SIMATIC Teleservice Adapter IE Basic | Lien |
SIMATIC Teleservice Adapter IE Basic | Lien |
SIMATIC Teleservice Adapter IE Basic | Lien |
SIMATIC Teleservice Adapter IE Standard | Lien |
SIMATIC Teleservice Adapter IE Standard | Lien |
SIMATIC WinAC RTX (F) 2010 | Lien |
SIMATIC WinAC RTX (F) 2010 | Lien |
SIMATIC WinAC RTX (F) 2010 | Lien |
SIMATIC WinAC RTX (F) 2010 | Lien |
SIMATIC WinAC RTX (F) 2010 | Lien |
SIMATIC WinAC RTX (F) 2010 | Lien |
SIMATIC WinCC OA | Lien |
SIMATIC WinCC OA V3.17 | Lien |
SIMATIC WinCC OA V3.18 | Lien |
SIMATIC WinCC Runtime Advanced | Lien |
SIMATIC WinCC Runtime Advanced | Lien |
SIMATIC WinCC Runtime Advanced | Lien |
SIMATIC WinCC TeleControl | Lien |
SIMATIC WinCC V15 and earlier | Lien |
SIMATIC WinCC V15 and earlier | Lien |
SIMATIC WinCC V16 | Lien |
SIMATIC WinCC V16 | Lien |
SIMATIC WinCC V17 | Lien |
SIMATIC WinCC V17 | Lien |
SIMATIC WinCC V7.4 and earlier | Lien |
SIMATIC WinCC V7.4 and earlier | Lien |
SIMATIC WinCC V7.5 | Lien |
SIMATIC WinCC V7.5 | Lien |
Simcenter 3D | Lien |
Simcenter Amesim | Lien |
Simcenter Femap V2020.2 | Lien |
Simcenter Femap V2021.1 | Lien |
Simcenter System Architect | Lien |
Simcenter System Simulation Client for Git | Lien |
Simcenter Testlab Data Management | Lien |
Simcenter Testlab | Lien |
SIMIT Simulation Platform | Lien |
SIMOCODE pro V EIP (incl. SIPLUS variants) | Lien |
SIMOCODE proV Ethernet/IP | Lien |
SIMOCODE pro V PN (incl. SIPLUS variants) | Lien |
SIMOCODE pro V PN (incl. SIPLUS variants) | Lien |
SIMOCODE pro V PN (incl. SIPLUS variants) | Lien |
SIMOCODE proV PROFINET | Lien |
SIMOTION C | Lien |
SIMOTION C | Lien |
SIMOTION D (incl. SIPLUS variants) | Lien |
SIMOTION D (incl. SIPLUS variants) | Lien |
SIMOTION (incl. SIPLUS variants) | Lien |
SIMOTION (incl. SIPLUS variants) | Lien |
SIMOTION P | Lien |
SIMOTION P V4.4 and V4.5 | Lien |
SIMOTION P V5 | Lien |
SINAMICS Connect 300 | Lien |
SINAMICS DCM | Lien |
SINAMICS DCM | Lien |
SINAMICS DCM w. PN | Lien |
SINAMICS DCM w. PN | Lien |
SINAMICS DCP | Lien |
SINAMICS DCP | Lien |
SINAMICS DCP | Lien |
SINAMICS DCP w. PN | Lien |
SINAMICS DCP w. PN | Lien |
SINAMICS G110M V4.7 Control Unit | Lien |
SINAMICS G110M V4.7 PN Control Unit | Lien |
SINAMICS G110M w. PN | Lien |
SINAMICS G110M w. PN | Lien |
SINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants) | Lien |
SINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants) | Lien |
SINAMICS G120 V4.7 Control Unit (incl. SIPLUS variants) | Lien |
SINAMICS G120 V4.7 PN Control Unit (incl. SIPLUS variants) | Lien |
SINAMICS G130 V4.6 Control Unit | Lien |
SINAMICS G130 V4.7 Control Unit | Lien |
SINAMICS G130 V4.7 Control Unit | Lien |
SINAMICS G130 V4.7 Control Unit | Lien |
SINAMICS G130 V4.7 SP1 Control Unit | Lien |
SINAMICS G130 V4.7 w. PN | Lien |
SINAMICS G130 V4.7 w. PN | Lien |
SINAMICS G130 V4.8 Control Unit | Lien |
SINAMICS G130 V4.8 w. PN | Lien |
SINAMICS G130 V4.8 w. PN | Lien |
SINAMICS G130 V5.1 Control Unit | Lien |
SINAMICS G130 V5.1 SP1 Control Unit | Lien |
SINAMICS G150 Control Unit | Lien |
SINAMICS G150 Control Unit | Lien |
SINAMICS G150 V4.6 Control Unit | Lien |
SINAMICS G150 V4.7 Control Unit | Lien |
SINAMICS G150 V4.7 SP1 Control Unit | Lien |
SINAMICS G150 V4.7 w. PN | Lien |
SINAMICS G150 V4.7 w. PN | Lien |
SINAMICS G150 V4.8 Control Unit | Lien |
SINAMICS G150 V4.8 w. PN | Lien |
SINAMICS G150 V4.8 w. PN | Lien |
SINAMICS G150 V5.1 Control Unit | Lien |
SINAMICS G150 V5.1 SP1 Control Unit | Lien |
SINAMICS GH150 V4.7 Control Unit | Lien |
SINAMICS GH150 V4.7 Control Unit | Lien |
SINAMICS GL150 V4.7 Control Unit | Lien |
SINAMICS GL150 V4.7 Control Unit | Lien |
SINAMICS GM150 V4.7 Control Unit | Lien |
SINAMICS GM150 V4.7 Control Unit | Lien |
SINAMICS S110 Control Unit | Lien |
SINAMICS S110 Control Unit | Lien |
SINAMICS S110 w. PN | Lien |
SINAMICS S110 w. PN | Lien |
SINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants) | Lien |
SINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants) | Lien |
SINAMICS S120 V4.6 Control Unit (incl. SIPLUS variants) | Lien |
SINAMICS S120 V4.7 Control Unit and CBE20 (incl. SIPLUS variants) | Lien |
SINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants) | Lien |
SINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants) | Lien |
SINAMICS S120 V4.7 SP1 Control Unit (incl. SIPLUS variants) | Lien |
SINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants) | Lien |
SINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants) | Lien |
SINAMICS S120 V4.7 w. PN (incl. SIPLUS variants) | Lien |
SINAMICS S120 V4.7 w. PN (incl. SIPLUS variants) | Lien |
SINAMICS S120 V4.8 Control Unit (incl. SIPLUS variants) | Lien |
SINAMICS S120 V4.8 w. PN (incl. SIPLUS variants) | Lien |
SINAMICS S120 V4.8 w. PN (incl. SIPLUS variants) | Lien |
SINAMICS S120 V5.1 Control Unit (incl. SIPLUS variants) | Lien |
SINAMICS S120 V5.1 SP1 Control Unit (incl. SIPLUS variants) | Lien |
SINAMICS S150 Control Unit | Lien |
SINAMICS S150 Control Unit | Lien |
SINAMICS S150 V4.6 Control Unit | Lien |
SINAMICS S150 V4.7 Control Unit | Lien |
SINAMICS S150 V4.7 SP1 Control Unit | Lien |
SINAMICS S150 V4.7 w. PN | Lien |
SINAMICS S150 V4.7 w. PN | Lien |
SINAMICS S150 V4.8 Control Unit | Lien |
SINAMICS S150 V4.8 w. PN | Lien |
SINAMICS S150 V4.8 w. PN | Lien |
SINAMICS S150 V5.1 Control Unit | Lien |
SINAMICS S150 V5.1 SP1 Control Unit | Lien |
SINAMICS S210 V5.1 Control Unit | Lien |
SINAMICS S210 V5.1 SP1 Control Unit | Lien |
SINAMICS S/G Control Unit w. PROFINET | Lien |
SINAMICS SL150 V4.7 Control Unit | Lien |
SINAMICS SL150 V4.7 Control Unit | Lien |
SINAMICS SM120 V4.7 Control Unit | Lien |
SINAMICS SM120 V4.7 Control Unit | Lien |
SINAMICS V90 w. PN | Lien |
SINAMICS V90 w. PN | Lien |
SINEC INS | Lien |
SINEC NMS | Lien |
SINEC-NMS | Lien |
SINEC NMS | Lien |
SINEMA Remote Connect Server | Lien |
SINEMA Remote Connect Server | Lien |
SINEMA Remote Connect Server | Lien |
SINEMA Remote Connect Server | Lien |
SINEMA Remote Connect Server | Lien |
SINEMA Server | Lien |
SINEMA Server | Lien |
SINEMA Server V14 | Lien |
SINUMERIK 808D | Lien |
SINUMERIK 828D HW PU.4 | Lien |
SINUMERIK 828D | Lien |
SINUMERIK 828D | Lien |
SINUMERIK 828D | Lien |
SINUMERIK 828D V4.5 and prior | Lien |
SINUMERIK 828D V4.7 | Lien |
SINUMERIK 840D sl | Lien |
SINUMERIK 840D sl | Lien |
SINUMERIK 840D sl | Lien |
SINUMERIK 840D sl | Lien |
SINUMERIK 840D sl V4.5 and prior | Lien |
SINUMERIK 840D sl V4.7 | Lien |
SINUMERIK MC MCU 1720 | Lien |
SINUMERIK ONE NCU 1740 | Lien |
SINUMERIK ONE PPU 1740 | Lien |
SINUMERIK ONE / SINUMERIK 840D sl Handheld Terminal HT 10 | Lien |
SINUMERIK OPC UA Server | Lien |
SINUMERIK OPC UA Server | Lien |
SINUMERIK Operate | Lien |
SiPass integrated V2.80 | Lien |
SiPass integrated V2.85 | Lien |
SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL | Lien |
SIPLUS ET 200SP CP 1543SP-1 ISEC | Lien |
SIPLUS ET 200SP CP 1543SP-1 ISEC | Lien |
SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL | Lien |
SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL | Lien |
SIPLUS NET CP 1543-1 | Lien |
SIPLUS NET CP 1543-1 | Lien |
SIPLUS NET CP 1543-1 | Lien |
SIPLUS NET CP 1543-1 | Lien |
SIPLUS NET CP 343-1 Advanced | Lien |
SIPLUS NET CP 343-1 Advanced | Lien |
SIPLUS NET CP 343-1 Advanced | Lien |
SIPLUS NET CP 343-1 Lean | Lien |
SIPLUS NET CP 343-1 | Lien |
SIPLUS NET CP 443-1 Advanced | Lien |
SIPLUS NET CP 443-1 Advanced | Lien |
SIPLUS NET CP 443-1 Advanced | Lien |
SIPLUS NET CP 443-1 | Lien |
SIPLUS NET CP 443-1 | Lien |
SIPLUS NET CP 443-1 | Lien |
SIPLUS S7-1200 CP 1243-1 RAIL | Lien |
SIPLUS S7-1200 CP 1243-1 RAIL | Lien |
SIPLUS S7-1200 CP 1243-1 RAIL | Lien |
SIPLUS S7-1200 CP 1243-1 | Lien |
SIPLUS S7-1200 CP 1243-1 | Lien |
SIPLUS S7-1200 CP 1243-1 | Lien |
SIPLUS TIM 1531 IRC | Lien |
SIPLUS TIM 1531 IRC | Lien |
SIRIUS ACT 3SU1 interface module PROFINET | Lien |
SIRIUS Motor Starter M200D PROFINET | Lien |
SIRIUS Soft Starter 3RW44 PN | Lien |
SIRIUS Soft Starter 3RW44 PN | Lien |
SITOP Manager | Lien |
SITOP PSU8600 PROFINET | Lien |
SITOP PSU8600 | Lien |
SITOP UPS1600 (incl. SIPLUS variants) | Lien |
SITOP UPS1600 PROFINET (incl. SIPLUS variants) | Lien |
Siveillance Command | Lien |
Siveillance Control Pro | Lien |
Siveillance Identity V1.5 | Lien |
Siveillance Identity V1.6 | Lien |
Siveillance Vantage | Lien |
SOFTNET-IE PNIO | Lien |
SOFTNET-IE PNIO | Lien |
Softnet PROFINET IO for PC-based Windows systems | Lien |
Solid Edge CAM Pro | Lien |
Solid Edge Harness Design | Lien |
Solid Edge SE2021 | Lien |
Solid Edge SE2022 | Lien |
Spectrum Power 4 | Lien |
Spectrum Power 4 | Lien |
Spectrum Power 7 | Lien |
SPPA-T3000 SeS3000 Security Server (6DU7054-0..00-..A0) | Lien |
Teamcenter Active Workspace | Lien |
Teamcenter Briefcase Browser | Lien |
Teamcenter Data Share Manager | Lien |
Teamcenter Deployment Center | Lien |
Teamcenter Dispatcher Service | Lien |
Teamcenter EDA | Lien |
Teamcenter FMS | Lien |
Teamcenter Integration for CATIA | Lien |
Teamcenter Integration Framework | Lien |
Teamcenter MBSE Gateway | Lien |
Teamcenter Mendix Connector | Lien |
Teamcenter Microservices Framework | Lien |
Teamcenter Polarion Integration | Lien |
Teamcenter Rapid Start | Lien |
Teamcenter Reporting and Analytics V11 | Lien |
Teamcenter Reporting and Analytics V12.2 | Lien |
Teamcenter Reporting and Analytics V12.3 | Lien |
Teamcenter Reporting and Analytics V12.4 | Lien |
Teamcenter Reporting and Analytics V13 | Lien |
Teamcenter Retail Footwear and Apparel | Lien |
Teamcenter Security Services | Lien |
Teamcenter Supplier Collaboration | Lien |
Teamcenter System Modeling Workbench | Lien |
Teamcenter | Lien |
Teamcenter Technical Publishing | Lien |
Teamcenter Visualization V12.4 | Lien |
Teamcenter Visualization V13.1 | Lien |
Teamcenter Visualization V13.2 | Lien |
Teamcenter Visualization V13.3 | Lien |
Tecnomatix eBOP Manager Server | Lien |
Tecnomatix Intosite | Lien |
Tecnomatix Plant Simulation | Lien |
Tecnomatix Process Designer | Lien |
Tecnomatix Process Simulate | Lien |
Tecnomatix Process Simulate VCLite | Lien |
Tecnomatix RobotExpert | Lien |
TeleControl Server Basic | Lien |
TIA Administrator | Lien |
TIA Administrator | Lien |
TIM 1531 IRC (incl. SIPLUS NET variants) | Lien |
TIM 1531 IRC (incl. SIPLUS NET variants) | Lien |
TIM 1531 IRC (incl. SIPLUS NET variants) | Lien |
TIM 1531 IRC | Lien |
TIM 1531 IRC | Lien |
TIM 3V-IE Advanced (incl. SIPLUS NET variants) | Lien |
TIM 3V-IE DNP3 (incl. SIPLUS NET variants) | Lien |
TIM 3V-IE (incl. SIPLUS NET variants) | Lien |
TIM 4R-IE DNP3 (incl. SIPLUS NET variants) | Lien |
TIM 4R-IE (incl. SIPLUS NET variants) | Lien |
Valor Parts Library - VPL Direct | Lien |
Valor Parts Library - VPL Server or Service | Lien |
VeSys | Lien |
Xpedition Enterprise VX.2.10 | Lien |
Xpedition Enterprise VX.2.6 | Lien |
Xpedition Enterprise VX.2.7 | Lien |
Xpedition Enterprise VX.2.8 | Lien |
Xpedition Enterprise (XCR) VX.2.10 | Lien |
Xpedition IC Packaging VX.2.10 | Lien |
Xpedition IC Packaging VX.2.6 | Lien |
Xpedition IC Packaging VX.2.7 | Lien |
Xpedition IC Packaging VX.2.8 | Lien |
Xpedition IC Packaging (XCR) VX.2.10 | Lien |
Vendor | Product | Description |
---|
Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [], "affected_systems_content": "\u003ctable\u003e \u003cthead\u003e \u003ctr\u003e \u003cth\u003eSyst\u00e8me affect\u00e9\u003c/th\u003e \u003cth\u003eLien vers l\u0027avis \u00e9diteur\u003c/th\u003e \u003c/tr\u003e \u003c/thead\u003e \u003ctbody\u003e \u003ctr\u003e \u003ctd\u003eAdvantage Navigator Energy \u0026amp; Sustainability\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eAdvantage Navigator Software Proxy V6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eBuilding Operator Discovery Distribution for the Connect X200 Gateway\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eBuilding Operator Discovery Distribution for the Connect X300 Gateway\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eBuilding Twin - 360\u00b0 Viewer\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCapital\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCerberus DMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCloudConnect 712\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS V10.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-995338.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS V10.3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-995338.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS V10.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-995338.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ecRSP Operator Client Starter\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ecRSP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDesigo CC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eE-Car OC Cloud Application\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergy Engage\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergyIP Prepay V3.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergyIP Prepay V3.8\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergyIP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnlighted Amaze\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnlighted Where\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eGeolus Shape Search V10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eGeolus Shape Search V11\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eGMA-Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eHEEDS Connect\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eHES UDIS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIE/AS-i Link PN IO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIE/PB-Link (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIE/PB LINK PN IO (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIndustrial Edge Hub\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIndustrial Edge Management App (IEM-App)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIndustrial Edge Management OS (IEM-OS)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ejROS for Spectrum Power 4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ejROS for Spectrum Power 7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eJT2Go\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eKTK ATE530S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eLOGO! CMR2020\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eLOGO! CMR2040\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMendix Applications\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere App Management Cockpits (Developer\u0026amp; Operator)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Asset Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindsphere Cloud Foundry\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindsphere Cloud Platform\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere IAM (User Management/ Settings)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Integrated Data Lake\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Notification Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Predictive Learning\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Usage Transparency Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Visual Explorer\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eNXpower Monitor\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eNX\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOpcenter EX CP Process Automation Control\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOpcenter Execution Core Process Automation Control\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOpcenter Intelligence\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOperation Scheduler\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ePROFINET Driver for Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ePSS(R)CAPE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRFID 181EIP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eROX II\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM APE1404 Linux\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM CROSSBOW Station Access Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RCM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) NAM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) NAM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX MX5000RE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX MX5000\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1501\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1510\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1511\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1512\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1524\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1536\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX5000\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RX1400 VPE Debian Linux\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RX1400 VPE Linux CloudConnect\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE LPE9403\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M-800 / S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M-800\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M875\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (RoW)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (RoW)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S602\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S602\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S602\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S612\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S612\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S612\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S627-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S627-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S627-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-1700 IEEE 802.11ac family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-1700 IEEE 802.11ac family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-1700 IEEE 802.11ac family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1750D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1750D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 EEC M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 EEC M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2IA M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2IA M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W700\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W721-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W721-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W722-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W722-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W738-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W738-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W761-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W761-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2IA RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2IA RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 SFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 SFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM763-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WLC711\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WLC712\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM763-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X200-4 P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X200-4 P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2FM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2FM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP/HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP/HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1LD (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X216\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X216\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X304-2FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X304-2FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X306-1LD FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X306-1LDFE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH+\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH+\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M PoE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M PoE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-1-2LD FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-1 FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-1FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-3LDFE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X408-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X408\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X414\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XB-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XB-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XB-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XC-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XC-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XC-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF-200BA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF-200BA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF-200BA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF202-2P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF202-2P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2BA IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2BA IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF208\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF208\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM-400 Family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM-400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM-400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XP-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XP-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XP-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-300WG\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-300WG\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-300WG\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (230V ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (230V ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (24V ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (24V ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M TS (24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (24V ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (24V ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M PoE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M PoE TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-500 Family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-500 Family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON 3VA COM100/800\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON 3VA DSP800\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC2200 (with CLP Approval)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC2200 (with MID Approval)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC2200 (without MID Approval)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC3200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC3200T\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC3220\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC4200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON powermanager V4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSICAM 230\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSICAM TOOLBOX II\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-669737.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIDOOR ATD430W\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIDOOR ATE530S COATED\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIDOOR ATE531S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIGUARD DSA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CFU PA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CFU PA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Cloud Connect 7 CC712\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Cloud Connect 7 CC716\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Compact Field Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7 GPRS V2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7 GPRS V2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7 GPRS V2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 IEC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1545-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1545-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1545-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1616 and CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP1616/CP1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1616\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1616\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP1626\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1626\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1628\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1628\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 ERPC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Lean (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Lean\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 442-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 442-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-211752.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC DK-16xx PN IO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Drive Controller family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Drive Controller family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL IM 157-1 PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M IM153-4 PN IO HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M IM153-4 PN IO ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro IM 154-3 PN HF\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro IM 154-4 PN HF\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 MF HF\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN Basic (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP (incl. SIPLUS variants except IM155-6 PN ST and IM155-6 PN HF)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Field PG M5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Field PG M6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels HMI Multi Panels HMI Mobile Panels (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IE/PB-LINK V3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Information Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC1047E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC1047\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC127E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC427E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC477E Pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC477E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC527G\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC547G\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC627E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC647D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC647E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC647E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC677E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC847D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC847E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC847E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC DiagMonitor\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC DiagMonitor\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC Support Package for VxWorks\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1500 PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1900 PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1900\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC2200 PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC2200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITP1000\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Logon\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MICRO-DRIVE PDC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV400 family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 H (6GF3540-0GE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 S (6GF3540-0CD10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 H (6GF3550-0GE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 S (6GF3550-0CD10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 U (6GF3560-0LE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 U\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 U\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 X (6GF3560-0HE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 X\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 X\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET CP 1616\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET DK-16xx PN IO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET PC Software\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 TeleControl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V8.2 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V8.2 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.0\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.0\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS neo\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS neo\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS neo\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PDM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Power Line Booster PLB Base Module\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Process Historian (incl. Process Historian OPC UA Server)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Process Historian OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Process Historian OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PROFINET Driver\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PROFINET Driver\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF166C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF180C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF180C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF182C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF182C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF182C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF185C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF185C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF185C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF360R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600 family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF650R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF680R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF685R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3010C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3030C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3031C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3041C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518F-4 PN/DP MFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518F-4 PN/DP MFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller (incl. F)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-200 SMART\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-200 SMART\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 CPU family and below (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-PLCSIM Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-PLCSIM Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Standard\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Standard\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC OA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC OA V3.17\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC OA V3.18\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC Runtime Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC Runtime Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC Runtime Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC TeleControl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V15 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V15 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V16\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V16\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V17\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V17\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.4 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.4 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter 3D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Amesim\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Femap V2020.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-609880.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Femap V2021.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-609880.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter System Architect\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter System Simulation Client for Git\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Testlab Data Management\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Testlab\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMIT Simulation Platform\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V EIP (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE proV Ethernet/IP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE proV PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION D (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION D (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION P V4.4 and V4.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION P V5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS Connect 300\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M V4.7 PN Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120 V4.7 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120 V4.7 PN Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.6 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.8 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.6 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.8 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GH150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GH150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GM150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GM150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.6 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 Control Unit and CBE20 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 SP1 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.8 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.8 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.8 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V5.1 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V5.1 SP1 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.6 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.8 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S210 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S210 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S/G Control Unit w. PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SM120 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SM120 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS V90 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS V90 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC INS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC NMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC-NMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC NMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-654775.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Server V14\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 808D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D HW PU.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D V4.5 and prior\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D V4.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl V4.5 and prior\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl V4.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK MC MCU 1720\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK ONE NCU 1740\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK ONE PPU 1740\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK ONE / SINUMERIK 840D sl Handheld Terminal HT 10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK Operate\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiPass integrated V2.80\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiPass integrated V2.85\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Lean\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1 RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1 RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1 RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS TIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS TIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS ACT 3SU1 interface module PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS Motor Starter M200D PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS Soft Starter 3RW44 PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS Soft Starter 3RW44 PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP PSU8600 PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP PSU8600\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP UPS1600 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP UPS1600 PROFINET (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Command\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Control Pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Identity V1.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Identity V1.6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Vantage\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSOFTNET-IE PNIO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSOFTNET-IE PNIO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSoftnet PROFINET IO for PC-based Windows systems\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge CAM Pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge Harness Design\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge SE2021\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge SE2022\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSpectrum Power 4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSpectrum Power 4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-831168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSpectrum Power 7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSPPA-T3000 SeS3000 Security Server (6DU7054-0..00-..A0)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-714170.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Active Workspace\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Briefcase Browser\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Data Share Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Deployment Center\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Dispatcher Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter EDA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter FMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Integration for CATIA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Integration Framework\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter MBSE Gateway\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Mendix Connector\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Microservices Framework\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Polarion Integration\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Rapid Start\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V11\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V12.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V12.3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V12.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V13\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Retail Footwear and Apparel\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Security Services\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Supplier Collaboration\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter System Modeling Workbench\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Technical Publishing\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V12.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V13.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V13.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V13.3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix eBOP Manager Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Intosite\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Plant Simulation\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Process Designer\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Process Simulate\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Process Simulate VCLite\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix RobotExpert\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeleControl Server Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIA Administrator\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIA Administrator\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 3V-IE Advanced (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 3V-IE DNP3 (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 3V-IE (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 4R-IE DNP3 (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 4R-IE (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eValor Parts Library - VPL Direct\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eValor Parts Library - VPL Server or Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eVeSys\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.8\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise (XCR) VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.8\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging (XCR) VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003c/tbody\u003e \u003c/table\u003e ", "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-40360", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40360" }, { "name": "CVE-2016-1547", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1547" }, { "name": "CVE-2021-37186", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37186" }, { "name": "CVE-2020-26139", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26139" }, { "name": "CVE-2016-4956", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4956" }, { "name": "CVE-2021-37198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37198" }, { "name": "CVE-2016-4953", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4953" }, { "name": "CVE-2021-40363", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40363" }, { "name": "CVE-2021-46151", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46151" }, { "name": "CVE-2021-44018", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44018" }, { "name": "CVE-2022-23312", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23312" }, { "name": "CVE-2021-41990", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41990" }, { "name": "CVE-2015-5621", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5621" }, { "name": "CVE-2021-46161", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46161" }, { "name": "CVE-2021-41991", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41991" }, { "name": "CVE-2021-46160", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46160" }, { "name": "CVE-2022-23102", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23102" }, { "name": "CVE-2019-11478", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11478" }, { "name": "CVE-2019-13933", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13933" }, { "name": "CVE-2019-8460", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8460" }, { "name": "CVE-2019-6575", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6575" }, { "name": "CVE-2020-26146", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26146" }, { "name": "CVE-2020-26143", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26143" }, { "name": "CVE-2019-6568", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6568" }, { "name": "CVE-2016-1550", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1550" }, { "name": "CVE-2015-7705", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7705" }, { "name": "CVE-2021-46156", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46156" }, { "name": "CVE-2021-37197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37197" }, { "name": "CVE-2016-7433", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7433" }, { "name": "CVE-2021-37194", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37194" }, { "name": "CVE-2021-46153", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46153" }, { "name": "CVE-2016-4955", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4955" }, { "name": "CVE-2015-7853", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7853" }, { "name": "CVE-2021-46152", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46152" }, { "name": "CVE-2017-2680", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2680" }, { "name": "CVE-2015-8138", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8138" }, { "name": "CVE-2020-12360", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12360" }, { "name": "CVE-2016-4954", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4954" }, { "name": "CVE-2020-24588", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24588" }, { "name": "CVE-2021-37185", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37185" }, { "name": "CVE-2021-46154", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46154" }, { "name": "CVE-2020-26140", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26140" }, { "name": "CVE-2021-37195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37195" }, { "name": "CVE-2020-8703", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8703" }, { "name": "CVE-2019-10936", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10936" }, { "name": "CVE-2020-12357", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12357" }, { "name": "CVE-2021-46159", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46159" }, { "name": "CVE-2021-3449", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3449" }, { "name": "CVE-2017-12741", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12741" }, { "name": "CVE-2021-40358", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40358" }, { "name": "CVE-2019-10923", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10923" }, { "name": "CVE-2021-43336", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43336" }, { "name": "CVE-2020-26144", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26144" }, { "name": "CVE-2021-44000", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44000" }, { "name": "CVE-2021-20094", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20094" }, { "name": "CVE-2020-24513", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24513" }, { "name": "CVE-2019-11479", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11479" }, { "name": "CVE-2021-20093", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20093" }, { "name": "CVE-2021-38405", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38405" }, { "name": "CVE-2020-24507", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24507" }, { "name": "CVE-2021-46155", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46155" }, { "name": "CVE-2020-13987", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13987" }, { "name": "CVE-2021-45046", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45046" }, { "name": "CVE-2020-12358", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12358" }, { "name": "CVE-2021-37196", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37196" }, { "name": "CVE-2021-40364", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40364" }, { "name": "CVE-2019-11477", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11477" }, { "name": "CVE-2020-26147", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26147" }, { "name": "CVE-2021-37204", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37204" }, { "name": "CVE-2019-19300", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19300" }, { "name": "CVE-2019-13946", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13946" }, { "name": "CVE-2019-10942", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10942" }, { "name": "CVE-2020-8670", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8670" }, { "name": "CVE-2017-2681", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2681" }, { "name": "CVE-2016-2518", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2518" }, { "name": "CVE-2020-8704", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8704" }, { "name": "CVE-2020-28400", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28400" }, { "name": "CVE-2021-46158", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46158" }, { "name": "CVE-2021-44228", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44228" }, { "name": "CVE-2016-7431", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7431" }, { "name": "CVE-2021-3712", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3712" }, { "name": "CVE-2020-26141", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26141" }, { "name": "CVE-2020-24486", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24486" }, { "name": "CVE-2020-24506", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24506" }, { "name": "CVE-2021-46157", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46157" }, { "name": "CVE-2021-45106", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45106" }, { "name": "CVE-2020-24512", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24512" }, { "name": "CVE-2020-17437", "url": "https://www.cve.org/CVERecord?id=CVE-2020-17437" }, { "name": "CVE-2021-44016", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44016" }, { "name": "CVE-2020-24511", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24511" }, { "name": "CVE-2021-40359", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40359" }, { "name": "CVE-2021-37205", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37205" }, { "name": "CVE-2018-18065", "url": "https://www.cve.org/CVERecord?id=CVE-2018-18065" }, { "name": "CVE-2017-6458", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6458" }, { "name": "CVE-2016-1548", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1548" }, { "name": "CVE-2019-19301", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19301" }, { "name": "CVE-2016-9042", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9042" }, { "name": "CVE-2020-26145", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26145" } ], "initial_release_date": "2022-02-09T00:00:00", "last_revision_date": "2022-02-09T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-124", "revisions": [ { "description": "Version initiale", "revision_date": "2022-02-09T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-541018 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-541018.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-914168 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-914168.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-309571 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-309571.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-675303 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-675303.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-244969 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-244969.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-654775 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-654775.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-316383 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-316383.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-100232 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-100232.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-480230 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-480230.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-978220 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-978220.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-840188 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-840188.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-211752 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-211752.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-772220 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-772220.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-539476 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-539476.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-599968 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-599968.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-443566 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-443566.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-995338 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-995338.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-462066 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-462066.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-102233 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-102233.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-301589 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-301589.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-669737 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-669737.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-609880 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-609880.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssb-439005 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssb-439005.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-473245 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-473245.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-831168 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-831168.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-593272 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-593272.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-838121 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-838121.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-307392 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-307392.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-780073 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-780073.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-349422 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-349422.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-346262 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-346262.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-293562 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-293562.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-913875 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-913875.html" } ] }
CERTFR-2021-AVI-442
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Siemens | N/A | SIMATIC NET CP 443-1 OPC UA toutes versions | ||
Siemens | N/A | Solid Edge SE2021 versions antérieures à SE2021MP5 | ||
Siemens | N/A | Mendix SAML Module versions antérieures à V2.1.2 | ||
Siemens | N/A | TIM 1531 IRC (incl. SIPLUS NET variants) versions antérieures à V2.2 | ||
Siemens | N/A | Simcenter Femap 2021.1 versions antérieures à V2021.1.MP3 | ||
Siemens | N/A | T2Go et Teamcenter Visualization versions antérieures à V13.1.0.3 | ||
Siemens | N/A | SIMATIC RF360R, RF615R, RF680R et RF685R | ||
Siemens | N/A | Solid Edge SE2020 versions antérieures à 2020MP14 | ||
Siemens | N/A | Simcenter Femap 2020.2 versions antérieures à V2020.2.MP3 | ||
Siemens | N/A | SIMATIC RF166C, RF185C, RF186C, RF186CI, RF188C et RF188CI versions antérieures à V1.3.2 |
Title | Publication Time | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "SIMATIC NET CP 443-1 OPC UA toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Solid Edge SE2021 versions ant\u00e9rieures \u00e0 SE2021MP5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Mendix SAML Module versions ant\u00e9rieures \u00e0 V2.1.2", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "TIM 1531 IRC (incl. SIPLUS NET variants) versions ant\u00e9rieures \u00e0 V2.2", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Simcenter Femap 2021.1 versions ant\u00e9rieures \u00e0 V2021.1.MP3", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "T2Go et Teamcenter Visualization versions ant\u00e9rieures \u00e0 V13.1.0.3", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC RF360R, RF615R, RF680R et RF685R", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Solid Edge SE2020 versions ant\u00e9rieures \u00e0 2020MP14", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Simcenter Femap 2020.2 versions ant\u00e9rieures \u00e0 V2020.2.MP3", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC RF166C, RF185C, RF186C, RF186CI, RF188C et RF188CI versions ant\u00e9rieures \u00e0 V1.3.2", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2016-1547", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1547" }, { "name": "CVE-2016-4956", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4956" }, { "name": "CVE-2021-33712", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33712" }, { "name": "CVE-2020-8169", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8169" }, { "name": "CVE-2016-4953", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4953" }, { "name": "CVE-2021-27399", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27399" }, { "name": "CVE-2020-8286", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8286" }, { "name": "CVE-2016-1550", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1550" }, { "name": "CVE-2015-7705", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7705" }, { "name": "CVE-2021-31343", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31343" }, { "name": "CVE-2016-7433", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7433" }, { "name": "CVE-2016-4955", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4955" }, { "name": "CVE-2015-7853", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7853" }, { "name": "CVE-2015-8138", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8138" }, { "name": "CVE-2016-4954", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4954" }, { "name": "CVE-2021-27387", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27387" }, { "name": "CVE-2021-31342", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31342" }, { "name": "CVE-2016-2518", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2518" }, { "name": "CVE-2018-0732", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0732" }, { "name": "CVE-2016-7431", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7431" }, { "name": "CVE-2021-31340", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31340" }, { "name": "CVE-2021-27390", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27390" }, { "name": "CVE-2017-6458", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6458" }, { "name": "CVE-2016-1548", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1548" }, { "name": "CVE-2016-9042", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9042" } ], "initial_release_date": "2021-06-08T00:00:00", "last_revision_date": "2021-06-08T00:00:00", "links": [], "reference": "CERTFR-2021-AVI-442", "revisions": [ { "description": "Version initiale", "revision_date": "2021-06-08T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-208356 du 08 juin 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-208356.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-645530 du 08 juin 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-645530.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-200951 du 08 juin 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-211752 du 08 juin 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-419820 du 08 juin 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-133038 du 08 juin 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-133038.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-787292 du 08 juin 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-787292.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-522654 du 08 juin 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-522654.pdf" } ] }
CERTFR-2016-AVI-153
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans les produits Cisco. Elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Cisco | N/A | Cisco WebEx Meetings Server version 2.6 | ||
Cisco | N/A | Cisco Prime Collaboration Assurance Software versions 10.5 à 11.0 | ||
Cisco | N/A | Cisco Finesse | ||
Cisco | N/A | Cisco ASA 5585-X FirePOWER SSP versions 6.0.x antérieures à 6.0.1 | ||
Cisco | N/A | Cisco APIC-EM version 1.0(1) | ||
Cisco | N/A | Cisco ASA 5585-X FirePOWER SSP versions 5.3.1.x antérieures à 5.3.1.7 | ||
Cisco | N/A | Cisco FirePOWER versions 5.3.x antérieures à 5.3.0.7 | ||
Cisco | N/A | Voir sur le site du constructeur pour les systèmes affectés par les vulnérabilités du Network Time Protocol Daemon (cf. section Documentation) | ||
Cisco | N/A | Cisco ASA 5585-X FirePOWER SSP versions 5.4.1.x antérieures à 5.4.1.6 | ||
Cisco | N/A | Cisco ASA 5585-X FirePOWER SSP versions 5.4.0.x antérieures à 5.4.0.7 | ||
Cisco | N/A | Cisco Information Server version 6.2 | ||
Cisco | N/A | Cisco FirePOWER versions 5.4.x antérieures à 5.4.0.4 | ||
Cisco | N/A | Cisco TelePresence EX Series, Integrator C Series, MX Series, Profile Series, SX Series, SX Quick Set Series, VX Clinical Assistant et VX Tactical exécutant les versions suivantes : TC 7.2.0, TC 7.2.1, TC 7.3.0, TC 7.3.1, TC 7.3.2, TC 7.3.3, TC 7.3.4, TC 7.3.5, CE 8.0.0, CE 8.0.1, ou CE 8.1.0 |
Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Cisco WebEx Meetings Server version 2.6", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Prime Collaboration Assurance Software versions 10.5 \u00e0 11.0", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Finesse", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco ASA 5585-X FirePOWER SSP versions 6.0.x ant\u00e9rieures \u00e0 6.0.1", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco APIC-EM version 1.0(1)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco ASA 5585-X FirePOWER SSP versions 5.3.1.x ant\u00e9rieures \u00e0 5.3.1.7", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco FirePOWER versions 5.3.x ant\u00e9rieures \u00e0 5.3.0.7", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Voir sur le site du constructeur pour les syst\u00e8mes affect\u00e9s par les vuln\u00e9rabilit\u00e9s du Network Time Protocol Daemon (cf. section Documentation)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco ASA 5585-X FirePOWER SSP versions 5.4.1.x ant\u00e9rieures \u00e0 5.4.1.6", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco ASA 5585-X FirePOWER SSP versions 5.4.0.x ant\u00e9rieures \u00e0 5.4.0.7", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Information Server version 6.2", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco FirePOWER versions 5.4.x ant\u00e9rieures \u00e0 5.4.0.4", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco TelePresence EX Series, Integrator C Series, MX Series, Profile Series, SX Series, SX Quick Set Series, VX Clinical Assistant et VX Tactical ex\u00e9cutant les versions suivantes : TC 7.2.0, TC 7.2.1, TC 7.3.0, TC 7.3.1, TC 7.3.2, TC 7.3.3, TC 7.3.4, TC 7.3.5, CE 8.0.0, CE 8.0.1, ou CE 8.1.0", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2016-1547", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1547" }, { "name": "CVE-2016-1387", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1387" }, { "name": "CVE-2016-2105", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2105" }, { "name": "CVE-2016-2176", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2176" }, { "name": "CVE-2016-1550", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1550" }, { "name": "CVE-2016-1343", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1343" }, { "name": "CVE-2016-1549", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1549" }, { "name": "CVE-2015-8138", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8138" }, { "name": "CVE-2016-1368", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1368" }, { "name": "CVE-2016-2107", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2107" }, { "name": "CVE-2016-1551", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1551" }, { "name": "CVE-2016-2106", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2106" }, { "name": "CVE-2016-1373", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1373" }, { "name": "CVE-2016-1392", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1392" }, { "name": "CVE-2016-2516", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2516" }, { "name": "CVE-2016-2518", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2518" }, { "name": "CVE-2016-2519", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2519" }, { "name": "CVE-2016-1369", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1369" }, { "name": "CVE-2015-7704", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7704" }, { "name": "CVE-2016-2517", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2517" }, { "name": "CVE-2016-2109", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2109" }, { "name": "CVE-2016-2108", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2108" }, { "name": "CVE-2016-1386", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1386" }, { "name": "CVE-2016-1389", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1389" }, { "name": "CVE-2016-1548", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1548" } ], "initial_release_date": "2016-05-06T00:00:00", "last_revision_date": "2016-05-06T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160428-ntpd du 28 avril 2016", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd" }, { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160504-tpxml du 04 mai 2016", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-tpxml" }, { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160428-apic du 28 avril 2016", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-apic" }, { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160428-cis du 04 mai 2016", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-cis" }, { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160428-cwms du 28 avril 2016", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-cwms" }, { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160504-finesse du 04 mai 2016", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-finesse" }, { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160504-openssl du 04 mai 2016", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl" }, { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160504-fpkern du 04 mai 2016", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-fpkern" }, { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160504-firepower du 04 mai 2016", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-firepower" }, { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160503-pca du 04 mai 2016", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160503-pca" } ], "reference": "CERTFR-2016-AVI-153", "revisions": [ { "description": "version initiale.", "revision_date": "2016-05-06T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Cisco\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, un contournement\nde la politique de s\u00e9curit\u00e9 et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160428-apic du 28 avril 2016", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160428-cwms du 28 avril 2016", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160428-cis du 28 avril 2016", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160504-openssl du 04 mai 2016", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160504-firepower du 04 mai 2016", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160504-fpkern du 04 mai 2016", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160504-finesse du 04 mai 2016", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160428-ntpd du 28 avril 2016", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160503-pca du 03 mai 2016", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160504-tpxml du 04 mai 2016", "url": null } ] }
rhsa-2016:1141
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ntp is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Network Time Protocol (NTP) is used to synchronize a computer\u0027s time with another referenced time source. These packages include the ntpd service which continuously adjusts system time and utilities used to query and configure the ntpd service.\n\nSecurity Fix(es):\n\n* It was found that when NTP was configured in broadcast mode, a remote attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server, causing them to become out of sync over a longer period of time. (CVE-2015-7979)\n\n* A denial of service flaw was found in the way NTP handled preemptable client associations. A remote attacker could send several crypto NAK packets to a victim client, each with a spoofed source address of an existing associated peer, preventing that client from synchronizing its time. (CVE-2016-1547)\n\n* It was found that an ntpd client could be forced to change from basic client/server mode to the interleaved symmetric mode. A remote attacker could use a spoofed packet that, when processed by an ntpd client, would cause that client to reject all future legitimate server responses, effectively disabling time synchronization on that client. (CVE-2016-1548)\n\n* A flaw was found in the way NTP\u0027s libntp performed message authentication. An attacker able to observe the timing of the comparison function used in packet authentication could potentially use this flaw to recover the message digest. (CVE-2016-1550)\n\n* An out-of-bounds access flaw was found in the way ntpd processed certain packets. An authenticated attacker could use a crafted packet to create a peer association with hmode of 7 and larger, which could potentially (although highly unlikely) cause ntpd to crash. (CVE-2016-2518)\n\nThe CVE-2016-1548 issue was discovered by Miroslav Lichvar (Red Hat).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1141", "url": "https://access.redhat.com/errata/RHSA-2016:1141" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1300271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300271" }, { "category": "external", "summary": "1331461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331461" }, { "category": "external", "summary": "1331462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331462" }, { "category": "external", "summary": "1331464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331464" }, { "category": "external", "summary": "1331468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331468" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1141.json" } ], "title": "Red Hat Security Advisory: ntp security update", "tracking": { "current_release_date": "2025-10-09T15:38:46+00:00", "generator": { "date": "2025-10-09T15:38:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2016:1141", "initial_release_date": "2016-05-31T08:11:54+00:00", "revision_history": [ { "date": "2016-05-31T08:11:54+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-05-31T08:11:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T15:38:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.2.src", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src", "product_id": "ntp-0:4.2.6p5-22.el7_2.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.2?arch=src" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-10.el6.1.src", "product": { "name": "ntp-0:4.2.6p5-10.el6.1.src", "product_id": "ntp-0:4.2.6p5-10.el6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-10.el6.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "product_id": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "product_id": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-10.el6.1.x86_64", "product": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64", "product_id": "ntp-0:4.2.6p5-10.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-10.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "product_id": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-10.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "product": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "product_id": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-10.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "product": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "product_id": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-10.el6.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "product": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "product_id": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-22.el7_2.2?arch=noarch" } } }, { "category": "product_version", "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "product": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "product_id": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-doc@4.2.6p5-22.el7_2.2?arch=noarch" } } }, { "category": "product_version", "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "product": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "product_id": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-doc@4.2.6p5-10.el6.1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "product_id": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.2?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.2?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "product_id": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.2?arch=ppc64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.2?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "product_id": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-10.el6.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "product": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "product_id": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-10.el6.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-10.el6.1.ppc64", "product": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64", "product_id": "ntp-0:4.2.6p5-10.el6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-10.el6.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "product": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "product_id": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-10.el6.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "product_id": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "product_id": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "product_id": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.2?arch=s390x" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.2?arch=s390x" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "product_id": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.2?arch=s390x" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.2?arch=s390x" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-10.el6.1.s390x", "product": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x", "product_id": "ntp-0:4.2.6p5-10.el6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-10.el6.1?arch=s390x" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "product": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "product_id": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-10.el6.1?arch=s390x" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "product": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "product_id": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-10.el6.1?arch=s390x" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "product": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "product_id": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-10.el6.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ntp-0:4.2.6p5-10.el6.1.i686", "product": { "name": "ntp-0:4.2.6p5-10.el6.1.i686", "product_id": "ntp-0:4.2.6p5-10.el6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-10.el6.1?arch=i686" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-10.el6.1.i686", "product": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686", "product_id": "ntpdate-0:4.2.6p5-10.el6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-10.el6.1?arch=i686" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "product": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "product_id": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-10.el6.1?arch=i686" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "product": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "product_id": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-10.el6.1?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7979", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1300271" } ], "notes": [ { "category": "description", "text": "It was found that when NTP was configured in broadcast mode, a remote attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server, causing them to become out of sync over a longer period of time.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: off-path denial of service on authenticated broadcast mode", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of ntp as shipped with Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue in Red Hat Enterprise Linux 6 and 7. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7979" }, { "category": "external", "summary": "RHBZ#1300271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300271" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7979", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7979" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7979", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7979" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0076/", "url": "http://www.talosintel.com/reports/TALOS-2016-0076/" } ], "release_date": "2016-01-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-31T08:11:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1141" }, { "category": "workaround", "details": "Do not use NTP\u0027s broadcast mode by not configuring the \"broadcast\" directive in the ntp.conf file.", "product_ids": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: off-path denial of service on authenticated broadcast mode" }, { "cve": "CVE-2016-1547", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331461" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way NTP handled preemptable client associations. A remote attacker could send several crypto NAK packets to a victim client, each with a spoofed source address of an existing associated peer, preventing that client from synchronizing its time.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: crypto-NAK preemptable association denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1547" }, { "category": "external", "summary": "RHBZ#1331461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331461" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1547", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1547" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0081/", "url": "http://www.talosintel.com/reports/TALOS-2016-0081/" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-31T08:11:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1141" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: crypto-NAK preemptable association denial of service" }, { "acknowledgments": [ { "names": [ "Miroslav Lichvar" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-1548", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331462" } ], "notes": [ { "category": "description", "text": "It was found that an ntpd client could be forced to change from basic client/server mode to the interleaved symmetric mode. A remote attacker could use a spoofed packet that, when processed by an ntpd client, would cause that client to reject all future legitimate server responses, effectively disabling time synchronization on that client.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: ntpd switching to interleaved mode with spoofed packets", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1548" }, { "category": "external", "summary": "RHBZ#1331462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331462" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1548", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1548" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0082/", "url": "http://www.talosintel.com/reports/TALOS-2016-0082/" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-31T08:11:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1141" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: ntpd switching to interleaved mode with spoofed packets" }, { "cve": "CVE-2016-1550", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331464" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way NTP\u0027s libntp performed message authentication. An attacker able to observe the timing of the comparison function used in packet authentication could potentially use this flaw to recover the message digest.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: libntp message digest disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1550" }, { "category": "external", "summary": "RHBZ#1331464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1550", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1550" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0084/", "url": "http://www.talosintel.com/reports/TALOS-2016-0084/" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-31T08:11:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1141" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "ntp: libntp message digest disclosure" }, { "cve": "CVE-2016-2518", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331468" } ], "notes": [ { "category": "description", "text": "An out-of-bounds access flaw was found in the way ntpd processed certain packets. An authenticated attacker could use a crafted packet to create a peer association with hmode of 7 and larger, which could potentially (although highly unlikely) cause ntpd to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: out-of-bounds references on crafted packet", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2518" }, { "category": "external", "summary": "RHBZ#1331468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331468" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2518", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2518" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-31T08:11:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1141" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:S/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "ntp: out-of-bounds references on crafted packet" } ] }
rhsa-2016:1552
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ntp is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Network Time Protocol (NTP) is used to synchronize a computer\u0027s time with another referenced time source. These packages include the ntpd service which continuously adjusts system time and utilities used to query and configure the ntpd service.\n\nSecurity Fix(es):\n\n* It was found that when NTP was configured in broadcast mode, a remote attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server, causing them to become out of sync over a longer period of time. (CVE-2015-7979)\n\n* A denial of service flaw was found in the way NTP handled preemptable client associations. A remote attacker could send several crypto NAK packets to a victim client, each with a spoofed source address of an existing associated peer, preventing that client from synchronizing its time. (CVE-2016-1547)\n\n* It was found that an ntpd client could be forced to change from basic client/server mode to the interleaved symmetric mode. A remote attacker could use a spoofed packet that, when processed by an ntpd client, would cause that client to reject all future legitimate server responses, effectively disabling time synchronization on that client. (CVE-2016-1548)\n\n* A flaw was found in the way NTP\u0027s libntp performed message authentication. An attacker able to observe the timing of the comparison function used in packet authentication could potentially use this flaw to recover the message digest. (CVE-2016-1550)\n\n* An out-of-bounds access flaw was found in the way ntpd processed certain packets. An authenticated attacker could use a crafted packet to create a peer association with hmode of 7 and larger, which could potentially (although highly unlikely) cause ntpd to crash. (CVE-2016-2518)\n\nThe CVE-2016-1548 issue was discovered by Miroslav Lichvar (Red Hat).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1552", "url": "https://access.redhat.com/errata/RHSA-2016:1552" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1300271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300271" }, { "category": "external", "summary": "1331461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331461" }, { "category": "external", "summary": "1331462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331462" }, { "category": "external", "summary": "1331464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331464" }, { "category": "external", "summary": "1331468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331468" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1552.json" } ], "title": "Red Hat Security Advisory: ntp security update", "tracking": { "current_release_date": "2025-10-09T15:38:46+00:00", "generator": { "date": "2025-10-09T15:38:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2016:1552", "initial_release_date": "2016-08-03T07:43:21+00:00", "revision_history": [ { "date": "2016-08-03T07:43:21+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-08-03T07:43:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T15:38:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.5?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "product_id": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.5?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.5?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.5.src", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.5.src", "product_id": "ntp-0:4.2.6p5-5.el6_7.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.5?arch=i686" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.5?arch=i686" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.5?arch=i686" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.5.i686", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.5.i686", "product_id": "ntp-0:4.2.6p5-5.el6_7.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.5?arch=s390x" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.5?arch=s390x" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.5?arch=s390x" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "product_id": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.5?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.5?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "product_id": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.5?arch=ppc64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "product": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "product_id": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-doc@4.2.6p5-5.el6_7.5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.src", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.src", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.src", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.src", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7979", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1300271" } ], "notes": [ { "category": "description", "text": "It was found that when NTP was configured in broadcast mode, a remote attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server, causing them to become out of sync over a longer period of time.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: off-path denial of service on authenticated broadcast mode", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of ntp as shipped with Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue in Red Hat Enterprise Linux 6 and 7. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7979" }, { "category": "external", "summary": "RHBZ#1300271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300271" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7979", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7979" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7979", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7979" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0076/", "url": "http://www.talosintel.com/reports/TALOS-2016-0076/" } ], "release_date": "2016-01-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-03T07:43:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the ntpd daemon will restart automatically.", "product_ids": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1552" }, { "category": "workaround", "details": "Do not use NTP\u0027s broadcast mode by not configuring the \"broadcast\" directive in the ntp.conf file.", "product_ids": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: off-path denial of service on authenticated broadcast mode" }, { "cve": "CVE-2016-1547", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331461" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way NTP handled preemptable client associations. A remote attacker could send several crypto NAK packets to a victim client, each with a spoofed source address of an existing associated peer, preventing that client from synchronizing its time.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: crypto-NAK preemptable association denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1547" }, { "category": "external", "summary": "RHBZ#1331461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331461" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1547", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1547" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0081/", "url": "http://www.talosintel.com/reports/TALOS-2016-0081/" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-03T07:43:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the ntpd daemon will restart automatically.", "product_ids": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1552" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: crypto-NAK preemptable association denial of service" }, { "acknowledgments": [ { "names": [ "Miroslav Lichvar" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-1548", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331462" } ], "notes": [ { "category": "description", "text": "It was found that an ntpd client could be forced to change from basic client/server mode to the interleaved symmetric mode. A remote attacker could use a spoofed packet that, when processed by an ntpd client, would cause that client to reject all future legitimate server responses, effectively disabling time synchronization on that client.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: ntpd switching to interleaved mode with spoofed packets", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1548" }, { "category": "external", "summary": "RHBZ#1331462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331462" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1548", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1548" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0082/", "url": "http://www.talosintel.com/reports/TALOS-2016-0082/" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-03T07:43:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the ntpd daemon will restart automatically.", "product_ids": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1552" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: ntpd switching to interleaved mode with spoofed packets" }, { "cve": "CVE-2016-1550", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331464" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way NTP\u0027s libntp performed message authentication. An attacker able to observe the timing of the comparison function used in packet authentication could potentially use this flaw to recover the message digest.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: libntp message digest disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1550" }, { "category": "external", "summary": "RHBZ#1331464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1550", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1550" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0084/", "url": "http://www.talosintel.com/reports/TALOS-2016-0084/" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-03T07:43:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the ntpd daemon will restart automatically.", "product_ids": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1552" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "ntp: libntp message digest disclosure" }, { "cve": "CVE-2016-2518", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331468" } ], "notes": [ { "category": "description", "text": "An out-of-bounds access flaw was found in the way ntpd processed certain packets. An authenticated attacker could use a crafted packet to create a peer association with hmode of 7 and larger, which could potentially (although highly unlikely) cause ntpd to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: out-of-bounds references on crafted packet", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2518" }, { "category": "external", "summary": "RHBZ#1331468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331468" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2518", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2518" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-03T07:43:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the ntpd daemon will restart automatically.", "product_ids": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1552" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:S/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "ntp: out-of-bounds references on crafted packet" } ] }
RHSA-2016:1141
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ntp is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Network Time Protocol (NTP) is used to synchronize a computer\u0027s time with another referenced time source. These packages include the ntpd service which continuously adjusts system time and utilities used to query and configure the ntpd service.\n\nSecurity Fix(es):\n\n* It was found that when NTP was configured in broadcast mode, a remote attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server, causing them to become out of sync over a longer period of time. (CVE-2015-7979)\n\n* A denial of service flaw was found in the way NTP handled preemptable client associations. A remote attacker could send several crypto NAK packets to a victim client, each with a spoofed source address of an existing associated peer, preventing that client from synchronizing its time. (CVE-2016-1547)\n\n* It was found that an ntpd client could be forced to change from basic client/server mode to the interleaved symmetric mode. A remote attacker could use a spoofed packet that, when processed by an ntpd client, would cause that client to reject all future legitimate server responses, effectively disabling time synchronization on that client. (CVE-2016-1548)\n\n* A flaw was found in the way NTP\u0027s libntp performed message authentication. An attacker able to observe the timing of the comparison function used in packet authentication could potentially use this flaw to recover the message digest. (CVE-2016-1550)\n\n* An out-of-bounds access flaw was found in the way ntpd processed certain packets. An authenticated attacker could use a crafted packet to create a peer association with hmode of 7 and larger, which could potentially (although highly unlikely) cause ntpd to crash. (CVE-2016-2518)\n\nThe CVE-2016-1548 issue was discovered by Miroslav Lichvar (Red Hat).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1141", "url": "https://access.redhat.com/errata/RHSA-2016:1141" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1300271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300271" }, { "category": "external", "summary": "1331461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331461" }, { "category": "external", "summary": "1331462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331462" }, { "category": "external", "summary": "1331464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331464" }, { "category": "external", "summary": "1331468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331468" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1141.json" } ], "title": "Red Hat Security Advisory: ntp security update", "tracking": { "current_release_date": "2025-10-09T15:38:46+00:00", "generator": { "date": "2025-10-09T15:38:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2016:1141", "initial_release_date": "2016-05-31T08:11:54+00:00", "revision_history": [ { "date": "2016-05-31T08:11:54+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-05-31T08:11:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T15:38:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.2.src", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src", "product_id": "ntp-0:4.2.6p5-22.el7_2.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.2?arch=src" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-10.el6.1.src", "product": { "name": "ntp-0:4.2.6p5-10.el6.1.src", "product_id": "ntp-0:4.2.6p5-10.el6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-10.el6.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "product_id": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "product_id": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-10.el6.1.x86_64", "product": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64", "product_id": "ntp-0:4.2.6p5-10.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-10.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "product_id": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-10.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "product": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "product_id": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-10.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "product": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "product_id": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-10.el6.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "product": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "product_id": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-22.el7_2.2?arch=noarch" } } }, { "category": "product_version", "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "product": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "product_id": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-doc@4.2.6p5-22.el7_2.2?arch=noarch" } } }, { "category": "product_version", "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "product": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "product_id": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-doc@4.2.6p5-10.el6.1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "product_id": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.2?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.2?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "product_id": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.2?arch=ppc64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.2?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "product_id": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-10.el6.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "product": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "product_id": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-10.el6.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-10.el6.1.ppc64", "product": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64", "product_id": "ntp-0:4.2.6p5-10.el6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-10.el6.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "product": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "product_id": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-10.el6.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "product_id": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "product_id": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "product_id": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.2?arch=s390x" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.2?arch=s390x" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "product_id": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.2?arch=s390x" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.2?arch=s390x" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-10.el6.1.s390x", "product": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x", "product_id": "ntp-0:4.2.6p5-10.el6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-10.el6.1?arch=s390x" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "product": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "product_id": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-10.el6.1?arch=s390x" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "product": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "product_id": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-10.el6.1?arch=s390x" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "product": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "product_id": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-10.el6.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ntp-0:4.2.6p5-10.el6.1.i686", "product": { "name": "ntp-0:4.2.6p5-10.el6.1.i686", "product_id": "ntp-0:4.2.6p5-10.el6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-10.el6.1?arch=i686" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-10.el6.1.i686", "product": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686", "product_id": "ntpdate-0:4.2.6p5-10.el6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-10.el6.1?arch=i686" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "product": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "product_id": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-10.el6.1?arch=i686" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "product": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "product_id": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-10.el6.1?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7979", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1300271" } ], "notes": [ { "category": "description", "text": "It was found that when NTP was configured in broadcast mode, a remote attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server, causing them to become out of sync over a longer period of time.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: off-path denial of service on authenticated broadcast mode", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of ntp as shipped with Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue in Red Hat Enterprise Linux 6 and 7. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7979" }, { "category": "external", "summary": "RHBZ#1300271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300271" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7979", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7979" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7979", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7979" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0076/", "url": "http://www.talosintel.com/reports/TALOS-2016-0076/" } ], "release_date": "2016-01-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-31T08:11:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1141" }, { "category": "workaround", "details": "Do not use NTP\u0027s broadcast mode by not configuring the \"broadcast\" directive in the ntp.conf file.", "product_ids": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: off-path denial of service on authenticated broadcast mode" }, { "cve": "CVE-2016-1547", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331461" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way NTP handled preemptable client associations. A remote attacker could send several crypto NAK packets to a victim client, each with a spoofed source address of an existing associated peer, preventing that client from synchronizing its time.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: crypto-NAK preemptable association denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1547" }, { "category": "external", "summary": "RHBZ#1331461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331461" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1547", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1547" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0081/", "url": "http://www.talosintel.com/reports/TALOS-2016-0081/" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-31T08:11:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1141" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: crypto-NAK preemptable association denial of service" }, { "acknowledgments": [ { "names": [ "Miroslav Lichvar" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-1548", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331462" } ], "notes": [ { "category": "description", "text": "It was found that an ntpd client could be forced to change from basic client/server mode to the interleaved symmetric mode. A remote attacker could use a spoofed packet that, when processed by an ntpd client, would cause that client to reject all future legitimate server responses, effectively disabling time synchronization on that client.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: ntpd switching to interleaved mode with spoofed packets", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1548" }, { "category": "external", "summary": "RHBZ#1331462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331462" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1548", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1548" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0082/", "url": "http://www.talosintel.com/reports/TALOS-2016-0082/" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-31T08:11:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1141" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: ntpd switching to interleaved mode with spoofed packets" }, { "cve": "CVE-2016-1550", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331464" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way NTP\u0027s libntp performed message authentication. An attacker able to observe the timing of the comparison function used in packet authentication could potentially use this flaw to recover the message digest.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: libntp message digest disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1550" }, { "category": "external", "summary": "RHBZ#1331464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1550", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1550" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0084/", "url": "http://www.talosintel.com/reports/TALOS-2016-0084/" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-31T08:11:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1141" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "ntp: libntp message digest disclosure" }, { "cve": "CVE-2016-2518", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331468" } ], "notes": [ { "category": "description", "text": "An out-of-bounds access flaw was found in the way ntpd processed certain packets. An authenticated attacker could use a crafted packet to create a peer association with hmode of 7 and larger, which could potentially (although highly unlikely) cause ntpd to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: out-of-bounds references on crafted packet", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2518" }, { "category": "external", "summary": "RHBZ#1331468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331468" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2518", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2518" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-31T08:11:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1141" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:S/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "ntp: out-of-bounds references on crafted packet" } ] }
rhsa-2016_1141
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ntp is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Network Time Protocol (NTP) is used to synchronize a computer\u0027s time with another referenced time source. These packages include the ntpd service which continuously adjusts system time and utilities used to query and configure the ntpd service.\n\nSecurity Fix(es):\n\n* It was found that when NTP was configured in broadcast mode, a remote attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server, causing them to become out of sync over a longer period of time. (CVE-2015-7979)\n\n* A denial of service flaw was found in the way NTP handled preemptable client associations. A remote attacker could send several crypto NAK packets to a victim client, each with a spoofed source address of an existing associated peer, preventing that client from synchronizing its time. (CVE-2016-1547)\n\n* It was found that an ntpd client could be forced to change from basic client/server mode to the interleaved symmetric mode. A remote attacker could use a spoofed packet that, when processed by an ntpd client, would cause that client to reject all future legitimate server responses, effectively disabling time synchronization on that client. (CVE-2016-1548)\n\n* A flaw was found in the way NTP\u0027s libntp performed message authentication. An attacker able to observe the timing of the comparison function used in packet authentication could potentially use this flaw to recover the message digest. (CVE-2016-1550)\n\n* An out-of-bounds access flaw was found in the way ntpd processed certain packets. An authenticated attacker could use a crafted packet to create a peer association with hmode of 7 and larger, which could potentially (although highly unlikely) cause ntpd to crash. (CVE-2016-2518)\n\nThe CVE-2016-1548 issue was discovered by Miroslav Lichvar (Red Hat).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1141", "url": "https://access.redhat.com/errata/RHSA-2016:1141" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1300271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300271" }, { "category": "external", "summary": "1331461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331461" }, { "category": "external", "summary": "1331462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331462" }, { "category": "external", "summary": "1331464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331464" }, { "category": "external", "summary": "1331468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331468" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1141.json" } ], "title": "Red Hat Security Advisory: ntp security update", "tracking": { "current_release_date": "2024-11-22T10:04:09+00:00", "generator": { "date": "2024-11-22T10:04:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:1141", "initial_release_date": "2016-05-31T08:11:54+00:00", "revision_history": [ { "date": "2016-05-31T08:11:54+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-05-31T08:11:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T10:04:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.2.src", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src", "product_id": "ntp-0:4.2.6p5-22.el7_2.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.2?arch=src" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-10.el6.1.src", "product": { "name": "ntp-0:4.2.6p5-10.el6.1.src", "product_id": "ntp-0:4.2.6p5-10.el6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-10.el6.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "product_id": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "product_id": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.2?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-10.el6.1.x86_64", "product": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64", "product_id": "ntp-0:4.2.6p5-10.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-10.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "product_id": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-10.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "product": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "product_id": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-10.el6.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "product": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "product_id": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-10.el6.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "product": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "product_id": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-22.el7_2.2?arch=noarch" } } }, { "category": "product_version", "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "product": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "product_id": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-doc@4.2.6p5-22.el7_2.2?arch=noarch" } } }, { "category": "product_version", "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "product": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "product_id": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-doc@4.2.6p5-10.el6.1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "product_id": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.2?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.2?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "product_id": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.2?arch=ppc64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.2?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "product_id": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-10.el6.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "product": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "product_id": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-10.el6.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-10.el6.1.ppc64", "product": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64", "product_id": "ntp-0:4.2.6p5-10.el6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-10.el6.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "product": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "product_id": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-10.el6.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "product_id": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "product_id": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.2?arch=ppc64le" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "product_id": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.2?arch=s390x" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.2?arch=s390x" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "product_id": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.2?arch=s390x" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.2?arch=s390x" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-10.el6.1.s390x", "product": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x", "product_id": "ntp-0:4.2.6p5-10.el6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-10.el6.1?arch=s390x" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "product": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "product_id": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-10.el6.1?arch=s390x" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "product": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "product_id": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-10.el6.1?arch=s390x" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "product": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "product_id": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-10.el6.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ntp-0:4.2.6p5-10.el6.1.i686", "product": { "name": "ntp-0:4.2.6p5-10.el6.1.i686", "product_id": "ntp-0:4.2.6p5-10.el6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-10.el6.1?arch=i686" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-10.el6.1.i686", "product": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686", "product_id": "ntpdate-0:4.2.6p5-10.el6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-10.el6.1?arch=i686" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "product": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "product_id": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-10.el6.1?arch=i686" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "product": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "product_id": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-10.el6.1?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.src", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-10.el6.1.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-10.el6.1.noarch", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-10.el6.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-10.el6.1.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.src", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.2.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7979", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1300271" } ], "notes": [ { "category": "description", "text": "It was found that when NTP was configured in broadcast mode, a remote attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server, causing them to become out of sync over a longer period of time.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: off-path denial of service on authenticated broadcast mode", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of ntp as shipped with Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue in Red Hat Enterprise Linux 6 and 7. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7979" }, { "category": "external", "summary": "RHBZ#1300271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300271" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7979", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7979" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7979", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7979" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0076/", "url": "http://www.talosintel.com/reports/TALOS-2016-0076/" } ], "release_date": "2016-01-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-31T08:11:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1141" }, { "category": "workaround", "details": "Do not use NTP\u0027s broadcast mode by not configuring the \"broadcast\" directive in the ntp.conf file.", "product_ids": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: off-path denial of service on authenticated broadcast mode" }, { "cve": "CVE-2016-1547", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331461" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way NTP handled preemptable client associations. A remote attacker could send several crypto NAK packets to a victim client, each with a spoofed source address of an existing associated peer, preventing that client from synchronizing its time.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: crypto-NAK preemptable association denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1547" }, { "category": "external", "summary": "RHBZ#1331461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331461" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1547", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1547" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0081/", "url": "http://www.talosintel.com/reports/TALOS-2016-0081/" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-31T08:11:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1141" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: crypto-NAK preemptable association denial of service" }, { "acknowledgments": [ { "names": [ "Miroslav Lichvar" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-1548", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331462" } ], "notes": [ { "category": "description", "text": "It was found that an ntpd client could be forced to change from basic client/server mode to the interleaved symmetric mode. A remote attacker could use a spoofed packet that, when processed by an ntpd client, would cause that client to reject all future legitimate server responses, effectively disabling time synchronization on that client.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: ntpd switching to interleaved mode with spoofed packets", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1548" }, { "category": "external", "summary": "RHBZ#1331462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331462" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1548", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1548" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0082/", "url": "http://www.talosintel.com/reports/TALOS-2016-0082/" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-31T08:11:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1141" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: ntpd switching to interleaved mode with spoofed packets" }, { "cve": "CVE-2016-1550", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331464" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way NTP\u0027s libntp performed message authentication. An attacker able to observe the timing of the comparison function used in packet authentication could potentially use this flaw to recover the message digest.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: libntp message digest disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1550" }, { "category": "external", "summary": "RHBZ#1331464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1550", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1550" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0084/", "url": "http://www.talosintel.com/reports/TALOS-2016-0084/" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-31T08:11:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1141" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "ntp: libntp message digest disclosure" }, { "cve": "CVE-2016-2518", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331468" } ], "notes": [ { "category": "description", "text": "An out-of-bounds access flaw was found in the way ntpd processed certain packets. An authenticated attacker could use a crafted packet to create a peer association with hmode of 7 and larger, which could potentially (although highly unlikely) cause ntpd to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: out-of-bounds references on crafted packet", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2518" }, { "category": "external", "summary": "RHBZ#1331468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331468" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2518", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2518" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-05-31T08:11:54+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1141" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:S/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Client-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Client-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6ComputeNode-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6ComputeNode-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Server-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Server-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.src", "6Workstation-optional-6.8.z:ntp-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-debuginfo-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntp-doc-0:4.2.6p5-10.el6.1.noarch", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntp-perl-0:4.2.6p5-10.el6.1.x86_64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.i686", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.ppc64", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.s390x", "6Workstation-optional-6.8.z:ntpdate-0:4.2.6p5-10.el6.1.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.2.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.2.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "ntp: out-of-bounds references on crafted packet" } ] }
RHSA-2016:1552
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ntp is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Network Time Protocol (NTP) is used to synchronize a computer\u0027s time with another referenced time source. These packages include the ntpd service which continuously adjusts system time and utilities used to query and configure the ntpd service.\n\nSecurity Fix(es):\n\n* It was found that when NTP was configured in broadcast mode, a remote attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server, causing them to become out of sync over a longer period of time. (CVE-2015-7979)\n\n* A denial of service flaw was found in the way NTP handled preemptable client associations. A remote attacker could send several crypto NAK packets to a victim client, each with a spoofed source address of an existing associated peer, preventing that client from synchronizing its time. (CVE-2016-1547)\n\n* It was found that an ntpd client could be forced to change from basic client/server mode to the interleaved symmetric mode. A remote attacker could use a spoofed packet that, when processed by an ntpd client, would cause that client to reject all future legitimate server responses, effectively disabling time synchronization on that client. (CVE-2016-1548)\n\n* A flaw was found in the way NTP\u0027s libntp performed message authentication. An attacker able to observe the timing of the comparison function used in packet authentication could potentially use this flaw to recover the message digest. (CVE-2016-1550)\n\n* An out-of-bounds access flaw was found in the way ntpd processed certain packets. An authenticated attacker could use a crafted packet to create a peer association with hmode of 7 and larger, which could potentially (although highly unlikely) cause ntpd to crash. (CVE-2016-2518)\n\nThe CVE-2016-1548 issue was discovered by Miroslav Lichvar (Red Hat).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1552", "url": "https://access.redhat.com/errata/RHSA-2016:1552" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1300271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300271" }, { "category": "external", "summary": "1331461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331461" }, { "category": "external", "summary": "1331462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331462" }, { "category": "external", "summary": "1331464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331464" }, { "category": "external", "summary": "1331468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331468" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1552.json" } ], "title": "Red Hat Security Advisory: ntp security update", "tracking": { "current_release_date": "2025-10-09T15:38:46+00:00", "generator": { "date": "2025-10-09T15:38:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2016:1552", "initial_release_date": "2016-08-03T07:43:21+00:00", "revision_history": [ { "date": "2016-08-03T07:43:21+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-08-03T07:43:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T15:38:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.5?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "product_id": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.5?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.5?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.5.src", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.5.src", "product_id": "ntp-0:4.2.6p5-5.el6_7.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.5?arch=i686" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.5?arch=i686" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.5?arch=i686" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.5.i686", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.5.i686", "product_id": "ntp-0:4.2.6p5-5.el6_7.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.5?arch=s390x" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.5?arch=s390x" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.5?arch=s390x" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "product_id": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.5?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.5?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "product_id": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.5?arch=ppc64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "product": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "product_id": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-doc@4.2.6p5-5.el6_7.5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.src", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.src", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.src", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.src", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7979", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1300271" } ], "notes": [ { "category": "description", "text": "It was found that when NTP was configured in broadcast mode, a remote attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server, causing them to become out of sync over a longer period of time.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: off-path denial of service on authenticated broadcast mode", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of ntp as shipped with Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue in Red Hat Enterprise Linux 6 and 7. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7979" }, { "category": "external", "summary": "RHBZ#1300271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300271" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7979", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7979" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7979", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7979" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0076/", "url": "http://www.talosintel.com/reports/TALOS-2016-0076/" } ], "release_date": "2016-01-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-03T07:43:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the ntpd daemon will restart automatically.", "product_ids": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1552" }, { "category": "workaround", "details": "Do not use NTP\u0027s broadcast mode by not configuring the \"broadcast\" directive in the ntp.conf file.", "product_ids": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: off-path denial of service on authenticated broadcast mode" }, { "cve": "CVE-2016-1547", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331461" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way NTP handled preemptable client associations. A remote attacker could send several crypto NAK packets to a victim client, each with a spoofed source address of an existing associated peer, preventing that client from synchronizing its time.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: crypto-NAK preemptable association denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1547" }, { "category": "external", "summary": "RHBZ#1331461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331461" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1547", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1547" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0081/", "url": "http://www.talosintel.com/reports/TALOS-2016-0081/" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-03T07:43:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the ntpd daemon will restart automatically.", "product_ids": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1552" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: crypto-NAK preemptable association denial of service" }, { "acknowledgments": [ { "names": [ "Miroslav Lichvar" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-1548", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331462" } ], "notes": [ { "category": "description", "text": "It was found that an ntpd client could be forced to change from basic client/server mode to the interleaved symmetric mode. A remote attacker could use a spoofed packet that, when processed by an ntpd client, would cause that client to reject all future legitimate server responses, effectively disabling time synchronization on that client.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: ntpd switching to interleaved mode with spoofed packets", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1548" }, { "category": "external", "summary": "RHBZ#1331462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331462" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1548", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1548" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0082/", "url": "http://www.talosintel.com/reports/TALOS-2016-0082/" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-03T07:43:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the ntpd daemon will restart automatically.", "product_ids": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1552" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: ntpd switching to interleaved mode with spoofed packets" }, { "cve": "CVE-2016-1550", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331464" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way NTP\u0027s libntp performed message authentication. An attacker able to observe the timing of the comparison function used in packet authentication could potentially use this flaw to recover the message digest.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: libntp message digest disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1550" }, { "category": "external", "summary": "RHBZ#1331464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1550", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1550" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0084/", "url": "http://www.talosintel.com/reports/TALOS-2016-0084/" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-03T07:43:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the ntpd daemon will restart automatically.", "product_ids": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1552" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "ntp: libntp message digest disclosure" }, { "cve": "CVE-2016-2518", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331468" } ], "notes": [ { "category": "description", "text": "An out-of-bounds access flaw was found in the way ntpd processed certain packets. An authenticated attacker could use a crafted packet to create a peer association with hmode of 7 and larger, which could potentially (although highly unlikely) cause ntpd to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: out-of-bounds references on crafted packet", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2518" }, { "category": "external", "summary": "RHBZ#1331468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331468" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2518", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2518" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-03T07:43:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the ntpd daemon will restart automatically.", "product_ids": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1552" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:S/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "ntp: out-of-bounds references on crafted packet" } ] }
rhsa-2016_1552
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for ntp is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Network Time Protocol (NTP) is used to synchronize a computer\u0027s time with another referenced time source. These packages include the ntpd service which continuously adjusts system time and utilities used to query and configure the ntpd service.\n\nSecurity Fix(es):\n\n* It was found that when NTP was configured in broadcast mode, a remote attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server, causing them to become out of sync over a longer period of time. (CVE-2015-7979)\n\n* A denial of service flaw was found in the way NTP handled preemptable client associations. A remote attacker could send several crypto NAK packets to a victim client, each with a spoofed source address of an existing associated peer, preventing that client from synchronizing its time. (CVE-2016-1547)\n\n* It was found that an ntpd client could be forced to change from basic client/server mode to the interleaved symmetric mode. A remote attacker could use a spoofed packet that, when processed by an ntpd client, would cause that client to reject all future legitimate server responses, effectively disabling time synchronization on that client. (CVE-2016-1548)\n\n* A flaw was found in the way NTP\u0027s libntp performed message authentication. An attacker able to observe the timing of the comparison function used in packet authentication could potentially use this flaw to recover the message digest. (CVE-2016-1550)\n\n* An out-of-bounds access flaw was found in the way ntpd processed certain packets. An authenticated attacker could use a crafted packet to create a peer association with hmode of 7 and larger, which could potentially (although highly unlikely) cause ntpd to crash. (CVE-2016-2518)\n\nThe CVE-2016-1548 issue was discovered by Miroslav Lichvar (Red Hat).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1552", "url": "https://access.redhat.com/errata/RHSA-2016:1552" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1300271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300271" }, { "category": "external", "summary": "1331461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331461" }, { "category": "external", "summary": "1331462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331462" }, { "category": "external", "summary": "1331464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331464" }, { "category": "external", "summary": "1331468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331468" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1552.json" } ], "title": "Red Hat Security Advisory: ntp security update", "tracking": { "current_release_date": "2024-11-22T10:04:15+00:00", "generator": { "date": "2024-11-22T10:04:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:1552", "initial_release_date": "2016-08-03T07:43:21+00:00", "revision_history": [ { "date": "2016-08-03T07:43:21+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-08-03T07:43:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T10:04:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.5?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "product_id": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.5?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.5?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.5.src", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.5.src", "product_id": "ntp-0:4.2.6p5-5.el6_7.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.5?arch=i686" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.5?arch=i686" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.5?arch=i686" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.5.i686", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.5.i686", "product_id": "ntp-0:4.2.6p5-5.el6_7.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.5?arch=s390x" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.5?arch=s390x" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.5?arch=s390x" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "product_id": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.5?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.5?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "product_id": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.5?arch=ppc64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "product": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "product_id": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-doc@4.2.6p5-5.el6_7.5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.src", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.src", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.src", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.src", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7979", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-01-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1300271" } ], "notes": [ { "category": "description", "text": "It was found that when NTP was configured in broadcast mode, a remote attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server, causing them to become out of sync over a longer period of time.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: off-path denial of service on authenticated broadcast mode", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of ntp as shipped with Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue in Red Hat Enterprise Linux 6 and 7. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7979" }, { "category": "external", "summary": "RHBZ#1300271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300271" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7979", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7979" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7979", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7979" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0076/", "url": "http://www.talosintel.com/reports/TALOS-2016-0076/" } ], "release_date": "2016-01-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-03T07:43:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the ntpd daemon will restart automatically.", "product_ids": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1552" }, { "category": "workaround", "details": "Do not use NTP\u0027s broadcast mode by not configuring the \"broadcast\" directive in the ntp.conf file.", "product_ids": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: off-path denial of service on authenticated broadcast mode" }, { "cve": "CVE-2016-1547", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331461" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way NTP handled preemptable client associations. A remote attacker could send several crypto NAK packets to a victim client, each with a spoofed source address of an existing associated peer, preventing that client from synchronizing its time.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: crypto-NAK preemptable association denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1547" }, { "category": "external", "summary": "RHBZ#1331461", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331461" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1547", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1547" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0081/", "url": "http://www.talosintel.com/reports/TALOS-2016-0081/" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-03T07:43:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the ntpd daemon will restart automatically.", "product_ids": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1552" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: crypto-NAK preemptable association denial of service" }, { "acknowledgments": [ { "names": [ "Miroslav Lichvar" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-1548", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331462" } ], "notes": [ { "category": "description", "text": "It was found that an ntpd client could be forced to change from basic client/server mode to the interleaved symmetric mode. A remote attacker could use a spoofed packet that, when processed by an ntpd client, would cause that client to reject all future legitimate server responses, effectively disabling time synchronization on that client.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: ntpd switching to interleaved mode with spoofed packets", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1548" }, { "category": "external", "summary": "RHBZ#1331462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331462" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1548", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1548" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0082/", "url": "http://www.talosintel.com/reports/TALOS-2016-0082/" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-03T07:43:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the ntpd daemon will restart automatically.", "product_ids": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1552" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: ntpd switching to interleaved mode with spoofed packets" }, { "cve": "CVE-2016-1550", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331464" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way NTP\u0027s libntp performed message authentication. An attacker able to observe the timing of the comparison function used in packet authentication could potentially use this flaw to recover the message digest.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: libntp message digest disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1550" }, { "category": "external", "summary": "RHBZ#1331464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1550", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1550" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0084/", "url": "http://www.talosintel.com/reports/TALOS-2016-0084/" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-03T07:43:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the ntpd daemon will restart automatically.", "product_ids": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1552" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "ntp: libntp message digest disclosure" }, { "cve": "CVE-2016-2518", "discovery_date": "2016-04-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1331468" } ], "notes": [ { "category": "description", "text": "An out-of-bounds access flaw was found in the way ntpd processed certain packets. An authenticated attacker could use a crafted packet to create a peer association with hmode of 7 and larger, which could potentially (although highly unlikely) cause ntpd to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: out-of-bounds references on crafted packet", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2518" }, { "category": "external", "summary": "RHBZ#1331468", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1331468" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2518", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2518" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" } ], "release_date": "2016-04-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-03T07:43:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing this update, the ntpd daemon will restart automatically.", "product_ids": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1552" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:S/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6ComputeNode-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6ComputeNode-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.src", "6Server-optional-6.7.EUS:ntp-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-debuginfo-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntp-doc-0:4.2.6p5-5.el6_7.5.noarch", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntp-perl-0:4.2.6p5-5.el6_7.5.x86_64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.i686", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.ppc64", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.s390x", "6Server-optional-6.7.EUS:ntpdate-0:4.2.6p5-5.el6_7.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "ntp: out-of-bounds references on crafted packet" } ] }
gsd-2016-2518
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2016-2518", "description": "The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.", "id": "GSD-2016-2518", "references": [ "https://www.suse.com/security/cve/CVE-2016-2518.html", "https://www.debian.org/security/2016/dsa-3629", "https://access.redhat.com/errata/RHSA-2016:1552", "https://access.redhat.com/errata/RHSA-2016:1141", "https://ubuntu.com/security/CVE-2016-2518", "https://advisories.mageia.org/CVE-2016-2518.html", "https://alas.aws.amazon.com/cve/html/CVE-2016-2518.html", "https://linux.oracle.com/cve/CVE-2016-2518.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-2518" ], "details": "The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.", "id": "GSD-2016-2518", "modified": "2023-12-13T01:21:19.323619Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-2518", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-3096-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3096-1" }, { "name": "DSA-3629", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3629" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "name": "http://support.ntp.org/bin/view/Main/NtpBug3009", "refsource": "CONFIRM", "url": "http://support.ntp.org/bin/view/Main/NtpBug3009" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "RHSA-2016:1141", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2016:1141" }, { "name": "SUSE-SU-2016:1912", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" }, { "name": "VU#718152", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/718152" }, { "name": "RHSA-2016:1552", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1552.html" }, { "name": "1035705", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1035705" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "https://security.netapp.com/advisory/ntap-20171004-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "name": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_ntp_4_2_8p7_Security", "refsource": "CONFIRM", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_ntp_4_2_8p7_Security" }, { "name": "20160428 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: April 2016", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd" }, { "name": "FreeBSD-SA-16:16", "refsource": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc" }, { "name": "SUSE-SU-2016:2094", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" }, { "name": "88226", "refsource": "BID", "url": "http://www.securityfocus.com/bid/88226" }, { "name": "openSUSE-SU-2016:1423", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" }, { "name": "GLSA-201607-15", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201607-15" }, { "name": "openSUSE-SU-2016:1329", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" }, { "name": "http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html" }, { "name": "SUSE-SU-2016:1471", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" }, { "name": "FEDORA-2016-5b2eb0bf9c", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html" }, { "name": "SUSE-SU-2016:1291", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" }, { "name": "DSA-3629", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2016/dsa-3629" }, { "name": "20160429 [slackware-security] ntp (SSA:2016-120-01)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/538233/100/0/threaded" }, { "name": "https://support.f5.com/csp/article/K20804323", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K20804323" }, { "name": "SUSE-SU-2016:1568", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" }, { "name": "20160429 [slackware-security] ntp (SSA:2016-120-01)", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded" }, { "name": "SUSE-SU-2016:1278", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" }, { "name": "FEDORA-2016-ed8c6c0426", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.2.8", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.3.92", "versionStartIncluding": "4.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:data_ontap:-:*:*:*:*:7-mode:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:oncommand_unified_manager_for_clustered_data_ontap:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:communications_user_data_repository:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_user_data_repository:10.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_user_data_repository:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p19:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p21:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p22:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p23:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p24:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p25:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p28:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p30:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p31:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p32:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p33:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p34:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p35:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p36:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p38:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p39:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:9.3:p9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.1:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.1:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.1:p10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.1:p12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.1:p15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.1:p16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.1:p17:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.1:p18:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.1:p19:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.1:p2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.1:p22:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.1:p24:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.1:p25:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.1:p26:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.1:p27:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.1:p28:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.1:p29:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.1:p3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.1:p30:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.1:p31:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.1:p4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.1:p5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.1:p6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.1:p7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.1:p8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.1:p9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.2:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.2:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.2:p10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.2:p11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.2:p12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.2:p13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.2:p14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.2:p2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.2:p5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.2:p7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.2:p8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.2:p9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:10.3:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_net_cp_443-1_opc_ua_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_net_cp_443-1_opc_ua:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-2518" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-125" } ] } ] }, "references": { "reference_data": [ { "name": "VU#718152", "refsource": "CERT-VN", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/718152" }, { "name": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_ntp_4_2_8p7_Security", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_ntp_4_2_8p7_Security" }, { "name": "http://support.ntp.org/bin/view/Main/NtpBug3009", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug3009" }, { "name": "88226", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/88226" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "GLSA-201607-15", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201607-15" }, { "name": "1035705", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1035705" }, { "name": "DSA-3629", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3629" }, { "name": "https://security.netapp.com/advisory/ntap-20171004-0002/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "name": "FreeBSD-SA-16:16", "refsource": "FREEBSD", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc" }, { "name": "RHSA-2016:1141", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2016:1141" }, { "name": "RHSA-2016:1552", "refsource": "REDHAT", "tags": [ "Broken Link" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1552.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "name": "SUSE-SU-2016:1278", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" }, { "name": "SUSE-SU-2016:1291", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" }, { "name": "openSUSE-SU-2016:1423", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" }, { "name": "SUSE-SU-2016:1912", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" }, { "name": "USN-3096-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-3096-1" }, { "name": "SUSE-SU-2016:2094", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" }, { "name": "20160428 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: April 2016", "refsource": "CISCO", "tags": [], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd" }, { "name": "20160429 [slackware-security] ntp (SSA:2016-120-01)", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded" }, { "name": "openSUSE-SU-2016:1329", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" }, { "name": "SUSE-SU-2016:1568", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" }, { "name": "SUSE-SU-2016:1471", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" }, { "name": "20160429 [slackware-security] ntp (SSA:2016-120-01)", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/538233/100/0/threaded" }, { "name": "http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html", "refsource": "MISC", "tags": [], "url": "http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11", "refsource": "MISC", "tags": [], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" }, { "name": "https://support.f5.com/csp/article/K20804323", "refsource": "CONFIRM", "tags": [], "url": "https://support.f5.com/csp/article/K20804323" }, { "name": "FEDORA-2016-ed8c6c0426", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html" }, { "name": "FEDORA-2016-5b2eb0bf9c", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html" }, { "name": "DSA-3629", "refsource": "DEBIAN", "tags": [], "url": "https://www.debian.org/security/2016/dsa-3629" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4 } }, "lastModifiedDate": "2021-06-10T13:15Z", "publishedDate": "2017-01-30T21:59Z" } } }
suse-su-2016:1291-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for ntp", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for ntp to 4.2.8p7 fixes the following issues:\n\n* CVE-2016-1547, bsc#977459:\n Validate crypto-NAKs, AKA: CRYPTO-NAK DoS.\n* CVE-2016-1548, bsc#977461: Interleave-pivot\n* CVE-2016-1549, bsc#977451:\n Sybil vulnerability: ephemeral association attack.\n* CVE-2016-1550, bsc#977464: Improve NTP security against buffer\n comparison timing attacks.\n* CVE-2016-1551, bsc#977450:\n Refclock impersonation vulnerability\n* CVE-2016-2516, bsc#977452: Duplicate IPs on unconfig\n directives will cause an assertion botch in ntpd.\n* CVE-2016-2517, bsc#977455: remote configuration trustedkey/\n requestkey/controlkey values are not properly validated.\n* CVE-2016-2518, bsc#977457: Crafted addpeer with hmode \u003e 7\n causes array wraparound with MATCH_ASSOC.\n* CVE-2016-2519, bsc#977458: ctl_getitem() return value not\n always checked.\n* This update also improves the fixes for:\n CVE-2015-7704, CVE-2015-7705, CVE-2015-7974\n\nBugs fixed:\n- Restrict the parser in the startup script to the first\n occurrance of \u0027keys\u0027 and \u0027controlkey\u0027 in ntp.conf (bsc#957226).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP1-2016-764,SUSE-SLE-SERVER-12-SP1-2016-764", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1291-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1291-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161291-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1291-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-May/002057.html" }, { "category": "self", "summary": "SUSE Bug 957226", "url": "https://bugzilla.suse.com/957226" }, { "category": "self", "summary": "SUSE Bug 977446", "url": "https://bugzilla.suse.com/977446" }, { "category": "self", "summary": "SUSE Bug 977450", "url": "https://bugzilla.suse.com/977450" }, { "category": "self", "summary": "SUSE Bug 977451", "url": "https://bugzilla.suse.com/977451" }, { "category": "self", "summary": "SUSE Bug 977452", "url": "https://bugzilla.suse.com/977452" }, { "category": "self", "summary": "SUSE Bug 977455", "url": "https://bugzilla.suse.com/977455" }, { "category": "self", "summary": "SUSE Bug 977457", "url": "https://bugzilla.suse.com/977457" }, { "category": "self", "summary": "SUSE Bug 977458", "url": "https://bugzilla.suse.com/977458" }, { "category": "self", "summary": "SUSE Bug 977459", "url": "https://bugzilla.suse.com/977459" }, { "category": "self", "summary": "SUSE Bug 977461", "url": "https://bugzilla.suse.com/977461" }, { "category": "self", "summary": "SUSE Bug 977464", "url": "https://bugzilla.suse.com/977464" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7704 page", "url": "https://www.suse.com/security/cve/CVE-2015-7704/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7705 page", "url": "https://www.suse.com/security/cve/CVE-2015-7705/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7974 page", "url": "https://www.suse.com/security/cve/CVE-2015-7974/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1547 page", "url": "https://www.suse.com/security/cve/CVE-2016-1547/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1548 page", "url": "https://www.suse.com/security/cve/CVE-2016-1548/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1549 page", "url": "https://www.suse.com/security/cve/CVE-2016-1549/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1550 page", "url": "https://www.suse.com/security/cve/CVE-2016-1550/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1551 page", "url": "https://www.suse.com/security/cve/CVE-2016-1551/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2516 page", "url": "https://www.suse.com/security/cve/CVE-2016-2516/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2517 page", "url": "https://www.suse.com/security/cve/CVE-2016-2517/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2518 page", "url": "https://www.suse.com/security/cve/CVE-2016-2518/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2519 page", "url": "https://www.suse.com/security/cve/CVE-2016-2519/" } ], "title": "Security update for ntp", "tracking": { "current_release_date": "2016-05-12T14:58:24Z", "generator": { "date": "2016-05-12T14:58:24Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1291-1", "initial_release_date": "2016-05-12T14:58:24Z", "revision_history": [ { "date": "2016-05-12T14:58:24Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p7-11.1.ppc64le", "product": { "name": "ntp-4.2.8p7-11.1.ppc64le", "product_id": "ntp-4.2.8p7-11.1.ppc64le" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p7-11.1.ppc64le", "product": { "name": "ntp-doc-4.2.8p7-11.1.ppc64le", "product_id": "ntp-doc-4.2.8p7-11.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p7-11.1.s390x", "product": { "name": "ntp-4.2.8p7-11.1.s390x", "product_id": "ntp-4.2.8p7-11.1.s390x" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p7-11.1.s390x", "product": { "name": "ntp-doc-4.2.8p7-11.1.s390x", "product_id": "ntp-doc-4.2.8p7-11.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p7-11.1.x86_64", "product": { "name": "ntp-4.2.8p7-11.1.x86_64", "product_id": "ntp-4.2.8p7-11.1.x86_64" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p7-11.1.x86_64", "product": { "name": "ntp-doc-4.2.8p7-11.1.x86_64", "product_id": "ntp-doc-4.2.8p7-11.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1", "product": { "name": "SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-11.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64" }, "product_reference": "ntp-4.2.8p7-11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-11.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" }, "product_reference": "ntp-doc-4.2.8p7-11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-11.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le" }, "product_reference": "ntp-4.2.8p7-11.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-11.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x" }, "product_reference": "ntp-4.2.8p7-11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-11.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64" }, "product_reference": "ntp-4.2.8p7-11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-11.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le" }, "product_reference": "ntp-doc-4.2.8p7-11.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-11.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x" }, "product_reference": "ntp-doc-4.2.8p7-11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-11.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" }, "product_reference": "ntp-doc-4.2.8p7-11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-11.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le" }, "product_reference": "ntp-4.2.8p7-11.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-11.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x" }, "product_reference": "ntp-4.2.8p7-11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-11.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64" }, "product_reference": "ntp-4.2.8p7-11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-11.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le" }, "product_reference": "ntp-doc-4.2.8p7-11.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-11.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x" }, "product_reference": "ntp-doc-4.2.8p7-11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-11.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" }, "product_reference": "ntp-doc-4.2.8p7-11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7704" } ], "notes": [ { "category": "general", "text": "The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted \"KOD\" messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7704", "url": "https://www.suse.com/security/cve/CVE-2015-7704" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7704", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7704", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 952611 for CVE-2015-7704", "url": "https://bugzilla.suse.com/952611" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7704", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2015-7704", "url": "https://bugzilla.suse.com/977446" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-12T14:58:24Z", "details": "important" } ], "title": "CVE-2015-7704" }, { "cve": "CVE-2015-7705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7705" } ], "notes": [ { "category": "general", "text": "The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7705", "url": "https://www.suse.com/security/cve/CVE-2015-7705" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7705", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7705", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 952611 for CVE-2015-7705", "url": "https://bugzilla.suse.com/952611" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7705", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-12T14:58:24Z", "details": "critical" } ], "title": "CVE-2015-7705" }, { "cve": "CVE-2015-7974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7974" } ], "notes": [ { "category": "general", "text": "NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a \"skeleton key.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7974", "url": "https://www.suse.com/security/cve/CVE-2015-7974" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7974", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962960 for CVE-2015-7974", "url": "https://bugzilla.suse.com/962960" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7974", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-12T14:58:24Z", "details": "low" } ], "title": "CVE-2015-7974" }, { "cve": "CVE-2016-1547", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1547" } ], "notes": [ { "category": "general", "text": "An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1547", "url": "https://www.suse.com/security/cve/CVE-2016-1547" }, { "category": "external", "summary": "SUSE Bug 962784 for CVE-2016-1547", "url": "https://bugzilla.suse.com/962784" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1547", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977459 for CVE-2016-1547", "url": "https://bugzilla.suse.com/977459" }, { "category": "external", "summary": "SUSE Bug 982064 for CVE-2016-1547", "url": "https://bugzilla.suse.com/982064" }, { "category": "external", "summary": "SUSE Bug 982065 for CVE-2016-1547", "url": "https://bugzilla.suse.com/982065" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-12T14:58:24Z", "details": "moderate" } ], "title": "CVE-2016-1547" }, { "cve": "CVE-2016-1548", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1548" } ], "notes": [ { "category": "general", "text": "An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-\u003edst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1548", "url": "https://www.suse.com/security/cve/CVE-2016-1548" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2016-1548", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1548", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977461 for CVE-2016-1548", "url": "https://bugzilla.suse.com/977461" }, { "category": "external", "summary": "SUSE Bug 982068 for CVE-2016-1548", "url": "https://bugzilla.suse.com/982068" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-12T14:58:24Z", "details": "moderate" } ], "title": "CVE-2016-1548" }, { "cve": "CVE-2016-1549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1549" } ], "notes": [ { "category": "general", "text": "A malicious authenticated peer can create arbitrarily-many ephemeral associations in order to win the clock selection algorithm in ntpd in NTP 4.2.8p4 and earlier and NTPsec 3e160db8dc248a0bcb053b56a80167dc742d2b74 and a5fb34b9cc89b92a8fef2f459004865c93bb7f92 and modify a victim\u0027s clock.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1549", "url": "https://www.suse.com/security/cve/CVE-2016-1549" }, { "category": "external", "summary": "SUSE Bug 1083424 for CVE-2016-1549", "url": "https://bugzilla.suse.com/1083424" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1549", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977451 for CVE-2016-1549", "url": "https://bugzilla.suse.com/977451" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-12T14:58:24Z", "details": "low" } ], "title": "CVE-2016-1549" }, { "cve": "CVE-2016-1550", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1550" } ], "notes": [ { "category": "general", "text": "An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest key.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1550", "url": "https://www.suse.com/security/cve/CVE-2016-1550" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1550", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977464 for CVE-2016-1550", "url": "https://bugzilla.suse.com/977464" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-12T14:58:24Z", "details": "low" } ], "title": "CVE-2016-1550" }, { "cve": "CVE-2016-1551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1551" } ], "notes": [ { "category": "general", "text": "ntpd in NTP 4.2.8p3 and NTPsec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 relies on the underlying operating system to protect it from requests that impersonate reference clocks. Because reference clocks are treated like other peers and stored in the same structure, any packet with a source ip address of a reference clock (127.127.1.1 for example) that reaches the receive() function will match that reference clock\u0027s peer record and will be treated as a trusted peer. Any system that lacks the typical martian packet filtering which would block these packets is in danger of having its time controlled by an attacker.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1551", "url": "https://www.suse.com/security/cve/CVE-2016-1551" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1551", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977450 for CVE-2016-1551", "url": "https://bugzilla.suse.com/977450" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-12T14:58:24Z", "details": "low" } ], "title": "CVE-2016-1551" }, { "cve": "CVE-2016-2516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2516" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p7 and 4.3.x before 4.3.92, when mode7 is enabled, allows remote attackers to cause a denial of service (ntpd abort) by using the same IP address multiple times in an unconfig directive.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2516", "url": "https://www.suse.com/security/cve/CVE-2016-2516" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-2516", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977452 for CVE-2016-2516", "url": "https://bugzilla.suse.com/977452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-12T14:58:24Z", "details": "moderate" } ], "title": "CVE-2016-2516" }, { "cve": "CVE-2016-2517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2517" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (prevent subsequent authentication) by leveraging knowledge of the controlkey or requestkey and sending a crafted packet to ntpd, which changes the value of trustedkey, controlkey, or requestkey. NOTE: this vulnerability exists because of a CVE-2016-2516 regression.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2517", "url": "https://www.suse.com/security/cve/CVE-2016-2517" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-2517", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977455 for CVE-2016-2517", "url": "https://bugzilla.suse.com/977455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-12T14:58:24Z", "details": "moderate" } ], "title": "CVE-2016-2517" }, { "cve": "CVE-2016-2518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2518" } ], "notes": [ { "category": "general", "text": "The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2518", "url": "https://www.suse.com/security/cve/CVE-2016-2518" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-2518", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977457 for CVE-2016-2518", "url": "https://bugzilla.suse.com/977457" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-12T14:58:24Z", "details": "low" } ], "title": "CVE-2016-2518" }, { "cve": "CVE-2016-2519", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2519" } ], "notes": [ { "category": "general", "text": "ntpd in NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (ntpd abort) by a large request data value, which triggers the ctl_getitem function to return a NULL value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2519", "url": "https://www.suse.com/security/cve/CVE-2016-2519" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2016-2519", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-2519", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977458 for CVE-2016-2519", "url": "https://bugzilla.suse.com/977458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-12T14:58:24Z", "details": "moderate" } ], "title": "CVE-2016-2519" } ] }
suse-su-2016:1471-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for ntp", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for ntp fixes the following issues: \n\n- Separate the creation of ntp.keys and key #1 in it to avoid\n problems when upgrading installations that have the file, but\n no key #1, which is needed e.g. by \u0027rcntp addserver\u0027.\n\n- Update to 4.2.8p7 (bsc#977446):\n * CVE-2016-1547, bsc#977459:\n Validate crypto-NAKs, AKA: CRYPTO-NAK DoS.\n * CVE-2016-1548, bsc#977461: Interleave-pivot\n * CVE-2016-1549, bsc#977451:\n Sybil vulnerability: ephemeral association attack.\n * CVE-2016-1550, bsc#977464: Improve NTP security against buffer\n comparison timing attacks.\n * CVE-2016-1551, bsc#977450:\n Refclock impersonation vulnerability\n * CVE-2016-2516, bsc#977452: Duplicate IPs on unconfig\n directives will cause an assertion botch in ntpd.\n * CVE-2016-2517, bsc#977455: remote configuration trustedkey/\n requestkey/controlkey values are not properly validated.\n * CVE-2016-2518, bsc#977457: Crafted addpeer with hmode \u003e 7\n causes array wraparound with MATCH_ASSOC.\n * CVE-2016-2519, bsc#977458: ctl_getitem() return value not\n always checked.\n * integrate ntp-fork.patch\n * Improve the fixes for:\n CVE-2015-7704, CVE-2015-7705, CVE-2015-7974\n- Restrict the parser in the startup script to the first\n occurrance of \u0027keys\u0027 and \u0027controlkey\u0027 in ntp.conf (bsc#957226).\n\n", "title": "Description of the patch" }, { "category": "details", "text": "sleclo50sp3-ntp-12592,sleman21-ntp-12592,slemap21-ntp-12592,slessp2-ntp-12592,slessp3-ntp-12592", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1471-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1471-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161471-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1471-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-June/002089.html" }, { "category": "self", "summary": "SUSE Bug 957226", "url": "https://bugzilla.suse.com/957226" }, { "category": "self", "summary": "SUSE Bug 977446", "url": "https://bugzilla.suse.com/977446" }, { "category": "self", "summary": "SUSE Bug 977450", "url": "https://bugzilla.suse.com/977450" }, { "category": "self", "summary": "SUSE Bug 977451", "url": "https://bugzilla.suse.com/977451" }, { "category": "self", "summary": "SUSE Bug 977452", "url": "https://bugzilla.suse.com/977452" }, { "category": "self", "summary": "SUSE Bug 977455", "url": "https://bugzilla.suse.com/977455" }, { "category": "self", "summary": "SUSE Bug 977457", "url": "https://bugzilla.suse.com/977457" }, { "category": "self", "summary": "SUSE Bug 977458", "url": "https://bugzilla.suse.com/977458" }, { "category": "self", "summary": "SUSE Bug 977459", "url": "https://bugzilla.suse.com/977459" }, { "category": "self", "summary": "SUSE Bug 977461", "url": "https://bugzilla.suse.com/977461" }, { "category": "self", "summary": "SUSE Bug 977464", "url": "https://bugzilla.suse.com/977464" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7704 page", "url": "https://www.suse.com/security/cve/CVE-2015-7704/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7705 page", "url": "https://www.suse.com/security/cve/CVE-2015-7705/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7974 page", "url": "https://www.suse.com/security/cve/CVE-2015-7974/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1547 page", "url": "https://www.suse.com/security/cve/CVE-2016-1547/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1548 page", "url": "https://www.suse.com/security/cve/CVE-2016-1548/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1549 page", "url": "https://www.suse.com/security/cve/CVE-2016-1549/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1550 page", "url": "https://www.suse.com/security/cve/CVE-2016-1550/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1551 page", "url": "https://www.suse.com/security/cve/CVE-2016-1551/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2516 page", "url": "https://www.suse.com/security/cve/CVE-2016-2516/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2517 page", "url": "https://www.suse.com/security/cve/CVE-2016-2517/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2518 page", "url": "https://www.suse.com/security/cve/CVE-2016-2518/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2519 page", "url": "https://www.suse.com/security/cve/CVE-2016-2519/" } ], "title": "Security update for ntp", "tracking": { "current_release_date": "2016-06-01T12:36:52Z", "generator": { "date": "2016-06-01T12:36:52Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1471-1", "initial_release_date": "2016-06-01T12:36:52Z", "revision_history": [ { "date": "2016-06-01T12:36:52Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p7-44.1.i586", "product": { "name": "ntp-4.2.8p7-44.1.i586", "product_id": "ntp-4.2.8p7-44.1.i586" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p7-44.1.i586", "product": { "name": "ntp-doc-4.2.8p7-44.1.i586", "product_id": "ntp-doc-4.2.8p7-44.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p7-44.1.s390x", "product": { "name": "ntp-4.2.8p7-44.1.s390x", "product_id": "ntp-4.2.8p7-44.1.s390x" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p7-44.1.s390x", "product": { "name": "ntp-doc-4.2.8p7-44.1.s390x", "product_id": "ntp-doc-4.2.8p7-44.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p7-44.1.x86_64", "product": { "name": "ntp-4.2.8p7-44.1.x86_64", "product_id": "ntp-4.2.8p7-44.1.x86_64" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p7-44.1.x86_64", "product": { "name": "ntp-doc-4.2.8p7-44.1.x86_64", "product_id": "ntp-doc-4.2.8p7-44.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 5", "product": { "name": "SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5", "product_identification_helper": { "cpe": "cpe:/o:suse:cloud:5" } } }, { "category": "product_name", "name": "SUSE Manager 2.1", "product": { "name": "SUSE Manager 2.1", "product_id": "SUSE Manager 2.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:2.1" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 2.1", "product": { "name": "SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:2.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-44.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64" }, "product_reference": "ntp-4.2.8p7-44.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-44.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" }, "product_reference": "ntp-doc-4.2.8p7-44.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-44.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x" }, "product_reference": "ntp-4.2.8p7-44.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-44.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64" }, "product_reference": "ntp-4.2.8p7-44.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-44.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x" }, "product_reference": "ntp-doc-4.2.8p7-44.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-44.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64" }, "product_reference": "ntp-doc-4.2.8p7-44.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-44.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64" }, "product_reference": "ntp-4.2.8p7-44.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-44.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64" }, "product_reference": "ntp-doc-4.2.8p7-44.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586" }, "product_reference": "ntp-4.2.8p7-44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-44.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x" }, "product_reference": "ntp-4.2.8p7-44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64" }, "product_reference": "ntp-4.2.8p7-44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586" }, "product_reference": "ntp-doc-4.2.8p7-44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-44.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x" }, "product_reference": "ntp-doc-4.2.8p7-44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64" }, "product_reference": "ntp-doc-4.2.8p7-44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-44.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586" }, "product_reference": "ntp-4.2.8p7-44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-44.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x" }, "product_reference": "ntp-4.2.8p7-44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64" }, "product_reference": "ntp-4.2.8p7-44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-44.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586" }, "product_reference": "ntp-doc-4.2.8p7-44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-44.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x" }, "product_reference": "ntp-doc-4.2.8p7-44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64" }, "product_reference": "ntp-doc-4.2.8p7-44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-44.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586" }, "product_reference": "ntp-4.2.8p7-44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-44.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x" }, "product_reference": "ntp-4.2.8p7-44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64" }, "product_reference": "ntp-4.2.8p7-44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-44.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586" }, "product_reference": "ntp-doc-4.2.8p7-44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-44.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x" }, "product_reference": "ntp-doc-4.2.8p7-44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64" }, "product_reference": "ntp-doc-4.2.8p7-44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7704" } ], "notes": [ { "category": "general", "text": "The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted \"KOD\" messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7704", "url": "https://www.suse.com/security/cve/CVE-2015-7704" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7704", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7704", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 952611 for CVE-2015-7704", "url": "https://bugzilla.suse.com/952611" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7704", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2015-7704", "url": "https://bugzilla.suse.com/977446" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-01T12:36:52Z", "details": "important" } ], "title": "CVE-2015-7704" }, { "cve": "CVE-2015-7705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7705" } ], "notes": [ { "category": "general", "text": "The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7705", "url": "https://www.suse.com/security/cve/CVE-2015-7705" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7705", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7705", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 952611 for CVE-2015-7705", "url": "https://bugzilla.suse.com/952611" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7705", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-01T12:36:52Z", "details": "critical" } ], "title": "CVE-2015-7705" }, { "cve": "CVE-2015-7974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7974" } ], "notes": [ { "category": "general", "text": "NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a \"skeleton key.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7974", "url": "https://www.suse.com/security/cve/CVE-2015-7974" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7974", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962960 for CVE-2015-7974", "url": "https://bugzilla.suse.com/962960" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7974", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-01T12:36:52Z", "details": "low" } ], "title": "CVE-2015-7974" }, { "cve": "CVE-2016-1547", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1547" } ], "notes": [ { "category": "general", "text": "An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1547", "url": "https://www.suse.com/security/cve/CVE-2016-1547" }, { "category": "external", "summary": "SUSE Bug 962784 for CVE-2016-1547", "url": "https://bugzilla.suse.com/962784" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1547", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977459 for CVE-2016-1547", "url": "https://bugzilla.suse.com/977459" }, { "category": "external", "summary": "SUSE Bug 982064 for CVE-2016-1547", "url": "https://bugzilla.suse.com/982064" }, { "category": "external", "summary": "SUSE Bug 982065 for CVE-2016-1547", "url": "https://bugzilla.suse.com/982065" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-01T12:36:52Z", "details": "moderate" } ], "title": "CVE-2016-1547" }, { "cve": "CVE-2016-1548", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1548" } ], "notes": [ { "category": "general", "text": "An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-\u003edst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1548", "url": "https://www.suse.com/security/cve/CVE-2016-1548" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2016-1548", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1548", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977461 for CVE-2016-1548", "url": "https://bugzilla.suse.com/977461" }, { "category": "external", "summary": "SUSE Bug 982068 for CVE-2016-1548", "url": "https://bugzilla.suse.com/982068" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-01T12:36:52Z", "details": "moderate" } ], "title": "CVE-2016-1548" }, { "cve": "CVE-2016-1549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1549" } ], "notes": [ { "category": "general", "text": "A malicious authenticated peer can create arbitrarily-many ephemeral associations in order to win the clock selection algorithm in ntpd in NTP 4.2.8p4 and earlier and NTPsec 3e160db8dc248a0bcb053b56a80167dc742d2b74 and a5fb34b9cc89b92a8fef2f459004865c93bb7f92 and modify a victim\u0027s clock.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1549", "url": "https://www.suse.com/security/cve/CVE-2016-1549" }, { "category": "external", "summary": "SUSE Bug 1083424 for CVE-2016-1549", "url": "https://bugzilla.suse.com/1083424" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1549", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977451 for CVE-2016-1549", "url": "https://bugzilla.suse.com/977451" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-01T12:36:52Z", "details": "low" } ], "title": "CVE-2016-1549" }, { "cve": "CVE-2016-1550", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1550" } ], "notes": [ { "category": "general", "text": "An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest key.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1550", "url": "https://www.suse.com/security/cve/CVE-2016-1550" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1550", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977464 for CVE-2016-1550", "url": "https://bugzilla.suse.com/977464" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-01T12:36:52Z", "details": "low" } ], "title": "CVE-2016-1550" }, { "cve": "CVE-2016-1551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1551" } ], "notes": [ { "category": "general", "text": "ntpd in NTP 4.2.8p3 and NTPsec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 relies on the underlying operating system to protect it from requests that impersonate reference clocks. Because reference clocks are treated like other peers and stored in the same structure, any packet with a source ip address of a reference clock (127.127.1.1 for example) that reaches the receive() function will match that reference clock\u0027s peer record and will be treated as a trusted peer. Any system that lacks the typical martian packet filtering which would block these packets is in danger of having its time controlled by an attacker.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1551", "url": "https://www.suse.com/security/cve/CVE-2016-1551" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1551", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977450 for CVE-2016-1551", "url": "https://bugzilla.suse.com/977450" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-01T12:36:52Z", "details": "low" } ], "title": "CVE-2016-1551" }, { "cve": "CVE-2016-2516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2516" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p7 and 4.3.x before 4.3.92, when mode7 is enabled, allows remote attackers to cause a denial of service (ntpd abort) by using the same IP address multiple times in an unconfig directive.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2516", "url": "https://www.suse.com/security/cve/CVE-2016-2516" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-2516", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977452 for CVE-2016-2516", "url": "https://bugzilla.suse.com/977452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-01T12:36:52Z", "details": "moderate" } ], "title": "CVE-2016-2516" }, { "cve": "CVE-2016-2517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2517" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (prevent subsequent authentication) by leveraging knowledge of the controlkey or requestkey and sending a crafted packet to ntpd, which changes the value of trustedkey, controlkey, or requestkey. NOTE: this vulnerability exists because of a CVE-2016-2516 regression.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2517", "url": "https://www.suse.com/security/cve/CVE-2016-2517" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-2517", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977455 for CVE-2016-2517", "url": "https://bugzilla.suse.com/977455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-01T12:36:52Z", "details": "moderate" } ], "title": "CVE-2016-2517" }, { "cve": "CVE-2016-2518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2518" } ], "notes": [ { "category": "general", "text": "The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2518", "url": "https://www.suse.com/security/cve/CVE-2016-2518" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-2518", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977457 for CVE-2016-2518", "url": "https://bugzilla.suse.com/977457" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-01T12:36:52Z", "details": "low" } ], "title": "CVE-2016-2518" }, { "cve": "CVE-2016-2519", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2519" } ], "notes": [ { "category": "general", "text": "ntpd in NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (ntpd abort) by a large request data value, which triggers the ctl_getitem function to return a NULL value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2519", "url": "https://www.suse.com/security/cve/CVE-2016-2519" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2016-2519", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-2519", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977458 for CVE-2016-2519", "url": "https://bugzilla.suse.com/977458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-01T12:36:52Z", "details": "moderate" } ], "title": "CVE-2016-2519" } ] }
suse-su-2016:1568-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for ntp", "title": "Title of the patch" }, { "category": "description", "text": "ntp was updated to version 4.2.8p8 to fix 17 security issues.\n\nThese security issues were fixed:\n- CVE-2016-4956: Broadcast interleave (bsc#982068).\n- CVE-2016-2518: Crafted addpeer with hmode \u003e 7 causes array wraparound with MATCH_ASSOC (bsc#977457).\n- CVE-2016-2519: ctl_getitem() return value not always checked (bsc#977458).\n- CVE-2016-4954: Processing spoofed server packets (bsc#982066).\n- CVE-2016-4955: Autokey association reset (bsc#982067).\n- CVE-2015-7974: NTP did not verify peer associations of symmetric keys when authenticating packets, which might allowed remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a \u0027skeleton key (bsc#962960).\n- CVE-2016-4957: CRYPTO_NAK crash (bsc#982064).\n- CVE-2016-2516: Duplicate IPs on unconfig directives will cause an assertion botch (bsc#977452).\n- CVE-2016-2517: Remote configuration trustedkey/requestkey values are not properly validated (bsc#977455).\n- CVE-2016-4953: Bad authentication demobilizes ephemeral associations (bsc#982065).\n- CVE-2016-1547: CRYPTO-NAK DoS (bsc#977459).\n- CVE-2016-1551: Refclock impersonation vulnerability, AKA: refclock-peering (bsc#977450).\n- CVE-2016-1550: Improve NTP security against buffer comparison timing attacks, authdecrypt-timing, AKA: authdecrypt-timing (bsc#977464).\n- CVE-2016-1548: Interleave-pivot - MITIGATION ONLY (bsc#977461).\n- CVE-2016-1549: Sybil vulnerability: ephemeral association attack, AKA: ntp-sybil - MITIGATION ONLY (bsc#977451).\n\nThis release also contained improved patches for CVE-2015-7704, CVE-2015-7705, CVE-2015-7974.\n\nThese non-security issues were fixed:\n- bsc#979302: Change the process name of the forking DNS worker process to avoid the impression that ntpd is started twice.\n- bsc#981422: Don\u0027t ignore SIGCHILD because it breaks wait().\n- bsc#979981: ntp-wait does not accept fractional seconds, so use 1 instead of 0.2 in ntp-wait.service.\n- Separate the creation of ntp.keys and key #1 in it to avoid problems when upgrading installations that have the file, but no key #1, which is needed e.g. by \u0027rcntp addserver\u0027.\n- bsc#957226: Restrict the parser in the startup script to the first occurrance of \u0027keys\u0027 and \u0027controlkey\u0027 in ntp.conf.\n ", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-2016-933,SUSE-SLE-SERVER-12-2016-933", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1568-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1568-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161568-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1568-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-June/002112.html" }, { "category": "self", "summary": "SUSE Bug 957226", "url": "https://bugzilla.suse.com/957226" }, { "category": "self", "summary": "SUSE Bug 962960", "url": "https://bugzilla.suse.com/962960" }, { "category": "self", "summary": "SUSE Bug 977450", "url": "https://bugzilla.suse.com/977450" }, { "category": "self", "summary": "SUSE Bug 977451", "url": "https://bugzilla.suse.com/977451" }, { "category": "self", "summary": "SUSE Bug 977452", "url": "https://bugzilla.suse.com/977452" }, { "category": "self", "summary": "SUSE Bug 977455", "url": "https://bugzilla.suse.com/977455" }, { "category": "self", "summary": "SUSE Bug 977457", "url": "https://bugzilla.suse.com/977457" }, { "category": "self", "summary": "SUSE Bug 977458", "url": "https://bugzilla.suse.com/977458" }, { "category": "self", "summary": "SUSE Bug 977459", "url": "https://bugzilla.suse.com/977459" }, { "category": "self", "summary": "SUSE Bug 977461", "url": "https://bugzilla.suse.com/977461" }, { "category": "self", "summary": "SUSE Bug 977464", "url": "https://bugzilla.suse.com/977464" }, { "category": "self", "summary": "SUSE Bug 979302", "url": "https://bugzilla.suse.com/979302" }, { "category": "self", "summary": "SUSE Bug 979981", "url": "https://bugzilla.suse.com/979981" }, { "category": "self", "summary": "SUSE Bug 981422", "url": "https://bugzilla.suse.com/981422" }, { "category": "self", "summary": "SUSE Bug 982064", "url": "https://bugzilla.suse.com/982064" }, { "category": "self", "summary": "SUSE Bug 982065", "url": "https://bugzilla.suse.com/982065" }, { "category": "self", "summary": "SUSE Bug 982066", "url": "https://bugzilla.suse.com/982066" }, { "category": "self", "summary": "SUSE Bug 982067", "url": "https://bugzilla.suse.com/982067" }, { "category": "self", "summary": "SUSE Bug 982068", "url": "https://bugzilla.suse.com/982068" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7704 page", "url": "https://www.suse.com/security/cve/CVE-2015-7704/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7705 page", "url": "https://www.suse.com/security/cve/CVE-2015-7705/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7974 page", "url": "https://www.suse.com/security/cve/CVE-2015-7974/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1547 page", "url": "https://www.suse.com/security/cve/CVE-2016-1547/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1548 page", "url": "https://www.suse.com/security/cve/CVE-2016-1548/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1549 page", "url": "https://www.suse.com/security/cve/CVE-2016-1549/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1550 page", "url": "https://www.suse.com/security/cve/CVE-2016-1550/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1551 page", "url": "https://www.suse.com/security/cve/CVE-2016-1551/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2516 page", "url": "https://www.suse.com/security/cve/CVE-2016-2516/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2517 page", "url": "https://www.suse.com/security/cve/CVE-2016-2517/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2518 page", "url": "https://www.suse.com/security/cve/CVE-2016-2518/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2519 page", "url": "https://www.suse.com/security/cve/CVE-2016-2519/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4953 page", "url": "https://www.suse.com/security/cve/CVE-2016-4953/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4954 page", "url": "https://www.suse.com/security/cve/CVE-2016-4954/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4955 page", "url": "https://www.suse.com/security/cve/CVE-2016-4955/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4956 page", "url": "https://www.suse.com/security/cve/CVE-2016-4956/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4957 page", "url": "https://www.suse.com/security/cve/CVE-2016-4957/" } ], "title": "Security update for ntp", "tracking": { "current_release_date": "2016-06-14T06:45:46Z", "generator": { "date": "2016-06-14T06:45:46Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1568-1", "initial_release_date": "2016-06-14T06:45:46Z", "revision_history": [ { "date": "2016-06-14T06:45:46Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p8-46.8.1.ppc64le", "product": { "name": "ntp-4.2.8p8-46.8.1.ppc64le", "product_id": "ntp-4.2.8p8-46.8.1.ppc64le" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p8-46.8.1.ppc64le", "product": { "name": "ntp-doc-4.2.8p8-46.8.1.ppc64le", "product_id": "ntp-doc-4.2.8p8-46.8.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p8-46.8.1.s390x", "product": { "name": "ntp-4.2.8p8-46.8.1.s390x", "product_id": "ntp-4.2.8p8-46.8.1.s390x" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p8-46.8.1.s390x", "product": { "name": "ntp-doc-4.2.8p8-46.8.1.s390x", "product_id": "ntp-doc-4.2.8p8-46.8.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p8-46.8.1.x86_64", "product": { "name": "ntp-4.2.8p8-46.8.1.x86_64", "product_id": "ntp-4.2.8p8-46.8.1.x86_64" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p8-46.8.1.x86_64", "product": { "name": "ntp-doc-4.2.8p8-46.8.1.x86_64", "product_id": "ntp-doc-4.2.8p8-46.8.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12", "product": { "name": "SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12", "product": { "name": "SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p8-46.8.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64" }, "product_reference": "ntp-4.2.8p8-46.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p8-46.8.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64" }, "product_reference": "ntp-doc-4.2.8p8-46.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p8-46.8.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le" }, "product_reference": "ntp-4.2.8p8-46.8.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p8-46.8.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x" }, "product_reference": "ntp-4.2.8p8-46.8.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p8-46.8.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64" }, "product_reference": "ntp-4.2.8p8-46.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p8-46.8.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le" }, "product_reference": "ntp-doc-4.2.8p8-46.8.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p8-46.8.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x" }, "product_reference": "ntp-doc-4.2.8p8-46.8.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p8-46.8.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64" }, "product_reference": "ntp-doc-4.2.8p8-46.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p8-46.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le" }, "product_reference": "ntp-4.2.8p8-46.8.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p8-46.8.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x" }, "product_reference": "ntp-4.2.8p8-46.8.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p8-46.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64" }, "product_reference": "ntp-4.2.8p8-46.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p8-46.8.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le" }, "product_reference": "ntp-doc-4.2.8p8-46.8.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p8-46.8.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x" }, "product_reference": "ntp-doc-4.2.8p8-46.8.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p8-46.8.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" }, "product_reference": "ntp-doc-4.2.8p8-46.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7704" } ], "notes": [ { "category": "general", "text": "The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted \"KOD\" messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7704", "url": "https://www.suse.com/security/cve/CVE-2015-7704" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7704", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7704", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 952611 for CVE-2015-7704", "url": "https://bugzilla.suse.com/952611" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7704", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2015-7704", "url": "https://bugzilla.suse.com/977446" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-14T06:45:46Z", "details": "important" } ], "title": "CVE-2015-7704" }, { "cve": "CVE-2015-7705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7705" } ], "notes": [ { "category": "general", "text": "The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7705", "url": "https://www.suse.com/security/cve/CVE-2015-7705" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7705", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7705", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 952611 for CVE-2015-7705", "url": "https://bugzilla.suse.com/952611" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7705", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-14T06:45:46Z", "details": "critical" } ], "title": "CVE-2015-7705" }, { "cve": "CVE-2015-7974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7974" } ], "notes": [ { "category": "general", "text": "NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a \"skeleton key.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7974", "url": "https://www.suse.com/security/cve/CVE-2015-7974" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7974", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962960 for CVE-2015-7974", "url": "https://bugzilla.suse.com/962960" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7974", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-14T06:45:46Z", "details": "low" } ], "title": "CVE-2015-7974" }, { "cve": "CVE-2016-1547", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1547" } ], "notes": [ { "category": "general", "text": "An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1547", "url": "https://www.suse.com/security/cve/CVE-2016-1547" }, { "category": "external", "summary": "SUSE Bug 962784 for CVE-2016-1547", "url": "https://bugzilla.suse.com/962784" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1547", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977459 for CVE-2016-1547", "url": "https://bugzilla.suse.com/977459" }, { "category": "external", "summary": "SUSE Bug 982064 for CVE-2016-1547", "url": "https://bugzilla.suse.com/982064" }, { "category": "external", "summary": "SUSE Bug 982065 for CVE-2016-1547", "url": "https://bugzilla.suse.com/982065" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-14T06:45:46Z", "details": "moderate" } ], "title": "CVE-2016-1547" }, { "cve": "CVE-2016-1548", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1548" } ], "notes": [ { "category": "general", "text": "An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-\u003edst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1548", "url": "https://www.suse.com/security/cve/CVE-2016-1548" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2016-1548", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1548", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977461 for CVE-2016-1548", "url": "https://bugzilla.suse.com/977461" }, { "category": "external", "summary": "SUSE Bug 982068 for CVE-2016-1548", "url": "https://bugzilla.suse.com/982068" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-14T06:45:46Z", "details": "moderate" } ], "title": "CVE-2016-1548" }, { "cve": "CVE-2016-1549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1549" } ], "notes": [ { "category": "general", "text": "A malicious authenticated peer can create arbitrarily-many ephemeral associations in order to win the clock selection algorithm in ntpd in NTP 4.2.8p4 and earlier and NTPsec 3e160db8dc248a0bcb053b56a80167dc742d2b74 and a5fb34b9cc89b92a8fef2f459004865c93bb7f92 and modify a victim\u0027s clock.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1549", "url": "https://www.suse.com/security/cve/CVE-2016-1549" }, { "category": "external", "summary": "SUSE Bug 1083424 for CVE-2016-1549", "url": "https://bugzilla.suse.com/1083424" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1549", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977451 for CVE-2016-1549", "url": "https://bugzilla.suse.com/977451" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-14T06:45:46Z", "details": "low" } ], "title": "CVE-2016-1549" }, { "cve": "CVE-2016-1550", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1550" } ], "notes": [ { "category": "general", "text": "An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest key.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1550", "url": "https://www.suse.com/security/cve/CVE-2016-1550" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1550", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977464 for CVE-2016-1550", "url": "https://bugzilla.suse.com/977464" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-14T06:45:46Z", "details": "low" } ], "title": "CVE-2016-1550" }, { "cve": "CVE-2016-1551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1551" } ], "notes": [ { "category": "general", "text": "ntpd in NTP 4.2.8p3 and NTPsec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 relies on the underlying operating system to protect it from requests that impersonate reference clocks. Because reference clocks are treated like other peers and stored in the same structure, any packet with a source ip address of a reference clock (127.127.1.1 for example) that reaches the receive() function will match that reference clock\u0027s peer record and will be treated as a trusted peer. Any system that lacks the typical martian packet filtering which would block these packets is in danger of having its time controlled by an attacker.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1551", "url": "https://www.suse.com/security/cve/CVE-2016-1551" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1551", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977450 for CVE-2016-1551", "url": "https://bugzilla.suse.com/977450" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-14T06:45:46Z", "details": "low" } ], "title": "CVE-2016-1551" }, { "cve": "CVE-2016-2516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2516" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p7 and 4.3.x before 4.3.92, when mode7 is enabled, allows remote attackers to cause a denial of service (ntpd abort) by using the same IP address multiple times in an unconfig directive.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2516", "url": "https://www.suse.com/security/cve/CVE-2016-2516" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-2516", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977452 for CVE-2016-2516", "url": "https://bugzilla.suse.com/977452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-14T06:45:46Z", "details": "moderate" } ], "title": "CVE-2016-2516" }, { "cve": "CVE-2016-2517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2517" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (prevent subsequent authentication) by leveraging knowledge of the controlkey or requestkey and sending a crafted packet to ntpd, which changes the value of trustedkey, controlkey, or requestkey. NOTE: this vulnerability exists because of a CVE-2016-2516 regression.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2517", "url": "https://www.suse.com/security/cve/CVE-2016-2517" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-2517", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977455 for CVE-2016-2517", "url": "https://bugzilla.suse.com/977455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-14T06:45:46Z", "details": "moderate" } ], "title": "CVE-2016-2517" }, { "cve": "CVE-2016-2518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2518" } ], "notes": [ { "category": "general", "text": "The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2518", "url": "https://www.suse.com/security/cve/CVE-2016-2518" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-2518", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977457 for CVE-2016-2518", "url": "https://bugzilla.suse.com/977457" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-14T06:45:46Z", "details": "low" } ], "title": "CVE-2016-2518" }, { "cve": "CVE-2016-2519", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2519" } ], "notes": [ { "category": "general", "text": "ntpd in NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (ntpd abort) by a large request data value, which triggers the ctl_getitem function to return a NULL value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2519", "url": "https://www.suse.com/security/cve/CVE-2016-2519" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2016-2519", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-2519", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977458 for CVE-2016-2519", "url": "https://bugzilla.suse.com/977458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-14T06:45:46Z", "details": "moderate" } ], "title": "CVE-2016-2519" }, { "cve": "CVE-2016-4953", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4953" } ], "notes": [ { "category": "general", "text": "ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (ephemeral-association demobilization) by sending a spoofed crypto-NAK packet with incorrect authentication data at a certain time.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4953", "url": "https://www.suse.com/security/cve/CVE-2016-4953" }, { "category": "external", "summary": "SUSE Bug 962784 for CVE-2016-4953", "url": "https://bugzilla.suse.com/962784" }, { "category": "external", "summary": "SUSE Bug 977459 for CVE-2016-4953", "url": "https://bugzilla.suse.com/977459" }, { "category": "external", "summary": "SUSE Bug 982056 for CVE-2016-4953", "url": "https://bugzilla.suse.com/982056" }, { "category": "external", "summary": "SUSE Bug 982065 for CVE-2016-4953", "url": "https://bugzilla.suse.com/982065" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-14T06:45:46Z", "details": "moderate" } ], "title": "CVE-2016-4953" }, { "cve": "CVE-2016-4954", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4954" } ], "notes": [ { "category": "general", "text": "The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4954", "url": "https://www.suse.com/security/cve/CVE-2016-4954" }, { "category": "external", "summary": "SUSE Bug 982056 for CVE-2016-4954", "url": "https://bugzilla.suse.com/982056" }, { "category": "external", "summary": "SUSE Bug 982066 for CVE-2016-4954", "url": "https://bugzilla.suse.com/982066" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-14T06:45:46Z", "details": "low" } ], "title": "CVE-2016-4954" }, { "cve": "CVE-2016-4955", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4955" } ], "notes": [ { "category": "general", "text": "ntpd in NTP 4.x before 4.2.8p8, when autokey is enabled, allows remote attackers to cause a denial of service (peer-variable clearing and association outage) by sending (1) a spoofed crypto-NAK packet or (2) a packet with an incorrect MAC value at a certain time.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4955", "url": "https://www.suse.com/security/cve/CVE-2016-4955" }, { "category": "external", "summary": "SUSE Bug 982056 for CVE-2016-4955", "url": "https://bugzilla.suse.com/982056" }, { "category": "external", "summary": "SUSE Bug 982067 for CVE-2016-4955", "url": "https://bugzilla.suse.com/982067" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-14T06:45:46Z", "details": "low" } ], "title": "CVE-2016-4955" }, { "cve": "CVE-2016-4956", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4956" } ], "notes": [ { "category": "general", "text": "ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (interleaved-mode transition and time change) via a spoofed broadcast packet. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-1548.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4956", "url": "https://www.suse.com/security/cve/CVE-2016-4956" }, { "category": "external", "summary": "SUSE Bug 977461 for CVE-2016-4956", "url": "https://bugzilla.suse.com/977461" }, { "category": "external", "summary": "SUSE Bug 982056 for CVE-2016-4956", "url": "https://bugzilla.suse.com/982056" }, { "category": "external", "summary": "SUSE Bug 982068 for CVE-2016-4956", "url": "https://bugzilla.suse.com/982068" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-14T06:45:46Z", "details": "low" } ], "title": "CVE-2016-4956" }, { "cve": "CVE-2016-4957", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4957" } ], "notes": [ { "category": "general", "text": "ntpd in NTP before 4.2.8p8 allows remote attackers to cause a denial of service (daemon crash) via a crypto-NAK packet. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-1547.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4957", "url": "https://www.suse.com/security/cve/CVE-2016-4957" }, { "category": "external", "summary": "SUSE Bug 977459 for CVE-2016-4957", "url": "https://bugzilla.suse.com/977459" }, { "category": "external", "summary": "SUSE Bug 982056 for CVE-2016-4957", "url": "https://bugzilla.suse.com/982056" }, { "category": "external", "summary": "SUSE Bug 982064 for CVE-2016-4957", "url": "https://bugzilla.suse.com/982064" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p8-46.8.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p8-46.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-14T06:45:46Z", "details": "moderate" } ], "title": "CVE-2016-4957" } ] }
suse-su-2016:1278-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for ntp", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for ntp to 4.2.8p7 fixes the following issues:\n\n* CVE-2016-1547, bsc#977459:\n Validate crypto-NAKs, AKA: CRYPTO-NAK DoS.\n* CVE-2016-1548, bsc#977461: Interleave-pivot\n* CVE-2016-1549, bsc#977451:\n Sybil vulnerability: ephemeral association attack.\n* CVE-2016-1550, bsc#977464: Improve NTP security against buffer\n comparison timing attacks.\n* CVE-2016-1551, bsc#977450:\n Refclock impersonation vulnerability\n* CVE-2016-2516, bsc#977452: Duplicate IPs on unconfig\n directives will cause an assertion botch in ntpd.\n* CVE-2016-2517, bsc#977455: remote configuration trustedkey/\n requestkey/controlkey values are not properly validated.\n* CVE-2016-2518, bsc#977457: Crafted addpeer with hmode \u003e 7\n causes array wraparound with MATCH_ASSOC.\n* CVE-2016-2519, bsc#977458: ctl_getitem() return value not\n always checked.\n* This update also improves the fixes for:\n CVE-2015-7704, CVE-2015-7705, CVE-2015-7974\n\nBugs fixed:\n- Restrict the parser in the startup script to the first\n occurrance of \u0027keys\u0027 and \u0027controlkey\u0027 in ntp.conf (bsc#957226).\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp4-ntp-12553", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1278-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1278-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161278-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1278-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-May/002054.html" }, { "category": "self", "summary": "SUSE Bug 957226", "url": "https://bugzilla.suse.com/957226" }, { "category": "self", "summary": "SUSE Bug 977446", "url": "https://bugzilla.suse.com/977446" }, { "category": "self", "summary": "SUSE Bug 977450", "url": "https://bugzilla.suse.com/977450" }, { "category": "self", "summary": "SUSE Bug 977451", "url": "https://bugzilla.suse.com/977451" }, { "category": "self", "summary": "SUSE Bug 977452", "url": "https://bugzilla.suse.com/977452" }, { "category": "self", "summary": "SUSE Bug 977455", "url": "https://bugzilla.suse.com/977455" }, { "category": "self", "summary": "SUSE Bug 977457", "url": "https://bugzilla.suse.com/977457" }, { "category": "self", "summary": "SUSE Bug 977458", "url": "https://bugzilla.suse.com/977458" }, { "category": "self", "summary": "SUSE Bug 977459", "url": "https://bugzilla.suse.com/977459" }, { "category": "self", "summary": "SUSE Bug 977461", "url": "https://bugzilla.suse.com/977461" }, { "category": "self", "summary": "SUSE Bug 977464", "url": "https://bugzilla.suse.com/977464" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7704 page", "url": "https://www.suse.com/security/cve/CVE-2015-7704/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7705 page", "url": "https://www.suse.com/security/cve/CVE-2015-7705/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7974 page", "url": "https://www.suse.com/security/cve/CVE-2015-7974/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1547 page", "url": "https://www.suse.com/security/cve/CVE-2016-1547/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1548 page", "url": "https://www.suse.com/security/cve/CVE-2016-1548/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1549 page", "url": "https://www.suse.com/security/cve/CVE-2016-1549/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1550 page", "url": "https://www.suse.com/security/cve/CVE-2016-1550/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1551 page", "url": "https://www.suse.com/security/cve/CVE-2016-1551/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2516 page", "url": "https://www.suse.com/security/cve/CVE-2016-2516/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2517 page", "url": "https://www.suse.com/security/cve/CVE-2016-2517/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2518 page", "url": "https://www.suse.com/security/cve/CVE-2016-2518/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2519 page", "url": "https://www.suse.com/security/cve/CVE-2016-2519/" } ], "title": "Security update for ntp", "tracking": { "current_release_date": "2016-05-11T12:37:44Z", "generator": { "date": "2016-05-11T12:37:44Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1278-1", "initial_release_date": "2016-05-11T12:37:44Z", "revision_history": [ { "date": "2016-05-11T12:37:44Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p7-11.1.i586", "product": { "name": "ntp-4.2.8p7-11.1.i586", "product_id": "ntp-4.2.8p7-11.1.i586" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p7-11.1.i586", "product": { "name": "ntp-doc-4.2.8p7-11.1.i586", "product_id": "ntp-doc-4.2.8p7-11.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p7-11.1.ia64", "product": { "name": "ntp-4.2.8p7-11.1.ia64", "product_id": "ntp-4.2.8p7-11.1.ia64" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p7-11.1.ia64", "product": { "name": "ntp-doc-4.2.8p7-11.1.ia64", "product_id": "ntp-doc-4.2.8p7-11.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p7-11.1.ppc64", "product": { "name": "ntp-4.2.8p7-11.1.ppc64", "product_id": "ntp-4.2.8p7-11.1.ppc64" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p7-11.1.ppc64", "product": { "name": "ntp-doc-4.2.8p7-11.1.ppc64", "product_id": "ntp-doc-4.2.8p7-11.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p7-11.1.s390x", "product": { "name": "ntp-4.2.8p7-11.1.s390x", "product_id": "ntp-4.2.8p7-11.1.s390x" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p7-11.1.s390x", "product": { "name": "ntp-doc-4.2.8p7-11.1.s390x", "product_id": "ntp-doc-4.2.8p7-11.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p7-11.1.x86_64", "product": { "name": "ntp-4.2.8p7-11.1.x86_64", "product_id": "ntp-4.2.8p7-11.1.x86_64" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p7-11.1.x86_64", "product": { "name": "ntp-doc-4.2.8p7-11.1.x86_64", "product_id": "ntp-doc-4.2.8p7-11.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-11.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586" }, "product_reference": "ntp-4.2.8p7-11.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-11.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64" }, "product_reference": "ntp-4.2.8p7-11.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-11.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64" }, "product_reference": "ntp-4.2.8p7-11.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-11.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x" }, "product_reference": "ntp-4.2.8p7-11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-11.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64" }, "product_reference": "ntp-4.2.8p7-11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-11.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586" }, "product_reference": "ntp-doc-4.2.8p7-11.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-11.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64" }, "product_reference": "ntp-doc-4.2.8p7-11.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-11.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64" }, "product_reference": "ntp-doc-4.2.8p7-11.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-11.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x" }, "product_reference": "ntp-doc-4.2.8p7-11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-11.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" }, "product_reference": "ntp-doc-4.2.8p7-11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-11.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586" }, "product_reference": "ntp-4.2.8p7-11.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-11.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64" }, "product_reference": "ntp-4.2.8p7-11.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-11.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64" }, "product_reference": "ntp-4.2.8p7-11.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-11.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x" }, "product_reference": "ntp-4.2.8p7-11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p7-11.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64" }, "product_reference": "ntp-4.2.8p7-11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-11.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586" }, "product_reference": "ntp-doc-4.2.8p7-11.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-11.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64" }, "product_reference": "ntp-doc-4.2.8p7-11.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-11.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64" }, "product_reference": "ntp-doc-4.2.8p7-11.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-11.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x" }, "product_reference": "ntp-doc-4.2.8p7-11.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p7-11.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" }, "product_reference": "ntp-doc-4.2.8p7-11.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7704" } ], "notes": [ { "category": "general", "text": "The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted \"KOD\" messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7704", "url": "https://www.suse.com/security/cve/CVE-2015-7704" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7704", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7704", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 952611 for CVE-2015-7704", "url": "https://bugzilla.suse.com/952611" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7704", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2015-7704", "url": "https://bugzilla.suse.com/977446" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-11T12:37:44Z", "details": "important" } ], "title": "CVE-2015-7704" }, { "cve": "CVE-2015-7705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7705" } ], "notes": [ { "category": "general", "text": "The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7705", "url": "https://www.suse.com/security/cve/CVE-2015-7705" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7705", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7705", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 952611 for CVE-2015-7705", "url": "https://bugzilla.suse.com/952611" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7705", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-11T12:37:44Z", "details": "critical" } ], "title": "CVE-2015-7705" }, { "cve": "CVE-2015-7974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7974" } ], "notes": [ { "category": "general", "text": "NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a \"skeleton key.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7974", "url": "https://www.suse.com/security/cve/CVE-2015-7974" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7974", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962960 for CVE-2015-7974", "url": "https://bugzilla.suse.com/962960" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7974", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-11T12:37:44Z", "details": "low" } ], "title": "CVE-2015-7974" }, { "cve": "CVE-2016-1547", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1547" } ], "notes": [ { "category": "general", "text": "An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1547", "url": "https://www.suse.com/security/cve/CVE-2016-1547" }, { "category": "external", "summary": "SUSE Bug 962784 for CVE-2016-1547", "url": "https://bugzilla.suse.com/962784" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1547", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977459 for CVE-2016-1547", "url": "https://bugzilla.suse.com/977459" }, { "category": "external", "summary": "SUSE Bug 982064 for CVE-2016-1547", "url": "https://bugzilla.suse.com/982064" }, { "category": "external", "summary": "SUSE Bug 982065 for CVE-2016-1547", "url": "https://bugzilla.suse.com/982065" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-11T12:37:44Z", "details": "moderate" } ], "title": "CVE-2016-1547" }, { "cve": "CVE-2016-1548", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1548" } ], "notes": [ { "category": "general", "text": "An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-\u003edst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1548", "url": "https://www.suse.com/security/cve/CVE-2016-1548" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2016-1548", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1548", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977461 for CVE-2016-1548", "url": "https://bugzilla.suse.com/977461" }, { "category": "external", "summary": "SUSE Bug 982068 for CVE-2016-1548", "url": "https://bugzilla.suse.com/982068" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-11T12:37:44Z", "details": "moderate" } ], "title": "CVE-2016-1548" }, { "cve": "CVE-2016-1549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1549" } ], "notes": [ { "category": "general", "text": "A malicious authenticated peer can create arbitrarily-many ephemeral associations in order to win the clock selection algorithm in ntpd in NTP 4.2.8p4 and earlier and NTPsec 3e160db8dc248a0bcb053b56a80167dc742d2b74 and a5fb34b9cc89b92a8fef2f459004865c93bb7f92 and modify a victim\u0027s clock.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1549", "url": "https://www.suse.com/security/cve/CVE-2016-1549" }, { "category": "external", "summary": "SUSE Bug 1083424 for CVE-2016-1549", "url": "https://bugzilla.suse.com/1083424" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1549", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977451 for CVE-2016-1549", "url": "https://bugzilla.suse.com/977451" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-11T12:37:44Z", "details": "low" } ], "title": "CVE-2016-1549" }, { "cve": "CVE-2016-1550", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1550" } ], "notes": [ { "category": "general", "text": "An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest key.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1550", "url": "https://www.suse.com/security/cve/CVE-2016-1550" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1550", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977464 for CVE-2016-1550", "url": "https://bugzilla.suse.com/977464" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-11T12:37:44Z", "details": "low" } ], "title": "CVE-2016-1550" }, { "cve": "CVE-2016-1551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1551" } ], "notes": [ { "category": "general", "text": "ntpd in NTP 4.2.8p3 and NTPsec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 relies on the underlying operating system to protect it from requests that impersonate reference clocks. Because reference clocks are treated like other peers and stored in the same structure, any packet with a source ip address of a reference clock (127.127.1.1 for example) that reaches the receive() function will match that reference clock\u0027s peer record and will be treated as a trusted peer. Any system that lacks the typical martian packet filtering which would block these packets is in danger of having its time controlled by an attacker.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1551", "url": "https://www.suse.com/security/cve/CVE-2016-1551" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1551", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977450 for CVE-2016-1551", "url": "https://bugzilla.suse.com/977450" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-11T12:37:44Z", "details": "low" } ], "title": "CVE-2016-1551" }, { "cve": "CVE-2016-2516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2516" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p7 and 4.3.x before 4.3.92, when mode7 is enabled, allows remote attackers to cause a denial of service (ntpd abort) by using the same IP address multiple times in an unconfig directive.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2516", "url": "https://www.suse.com/security/cve/CVE-2016-2516" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-2516", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977452 for CVE-2016-2516", "url": "https://bugzilla.suse.com/977452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-11T12:37:44Z", "details": "moderate" } ], "title": "CVE-2016-2516" }, { "cve": "CVE-2016-2517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2517" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (prevent subsequent authentication) by leveraging knowledge of the controlkey or requestkey and sending a crafted packet to ntpd, which changes the value of trustedkey, controlkey, or requestkey. NOTE: this vulnerability exists because of a CVE-2016-2516 regression.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2517", "url": "https://www.suse.com/security/cve/CVE-2016-2517" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-2517", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977455 for CVE-2016-2517", "url": "https://bugzilla.suse.com/977455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-11T12:37:44Z", "details": "moderate" } ], "title": "CVE-2016-2517" }, { "cve": "CVE-2016-2518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2518" } ], "notes": [ { "category": "general", "text": "The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2518", "url": "https://www.suse.com/security/cve/CVE-2016-2518" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-2518", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977457 for CVE-2016-2518", "url": "https://bugzilla.suse.com/977457" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-11T12:37:44Z", "details": "low" } ], "title": "CVE-2016-2518" }, { "cve": "CVE-2016-2519", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2519" } ], "notes": [ { "category": "general", "text": "ntpd in NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (ntpd abort) by a large request data value, which triggers the ctl_getitem function to return a NULL value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2519", "url": "https://www.suse.com/security/cve/CVE-2016-2519" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2016-2519", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-2519", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977458 for CVE-2016-2519", "url": "https://bugzilla.suse.com/977458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p7-11.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p7-11.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-11T12:37:44Z", "details": "moderate" } ], "title": "CVE-2016-2519" } ] }
ICSA-21-159-11
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting these vulnerabilities to CISA." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "notes": [ { "category": "summary", "text": "All versions of the SIMATIC CP 443-1 OPC UA contain multiple vulnerabilities in the underlying third party component NTP.\n\nSiemens recommends specific countermeasures for products where updates are not, or not yet available.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "other", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-211752: Multiple NTP-Client Related Vulnerabilities in SIMATIC CP 443-1 OPC UA - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-211752.json" }, { "category": "self", "summary": "SSA-211752: Multiple NTP-Client Related Vulnerabilities in SIMATIC CP 443-1 OPC UA - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-211752.txt" }, { "category": "self", "summary": "SSA-211752: Multiple NTP-Client Related Vulnerabilities in SIMATIC CP 443-1 OPC UA - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "category": "self", "summary": "ICS Advisory ICSA-21-159-11 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-159-11.json" }, { "category": "self", "summary": "ICS Advisory ICSA-21-159-11 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-159-11" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens SIMATIC NET CP 443-1 OPC UA", "tracking": { "current_release_date": "2025-05-06T06:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-21-159-11", "initial_release_date": "2021-06-08T00:00:00.000000Z", "revision_history": [ { "date": "2021-06-08T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2022-02-08T00:00:00.000000Z", "legacy_version": "1.1", "number": "2", "summary": "No remediation planned for SIMATIC CP 443-1 OPC UA" }, { "date": "2025-05-06T06:00:00.000000Z", "legacy_version": "Revision", "number": "3", "summary": "Revision - Fixing typos" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 443-1 OPC UA (6GK7443-1UX00-0XE0)", "product_id": "CSAFPID-0001", "product_identification_helper": { "model_numbers": [ "6GK7443-1UX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 443-1 OPC UA" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7705", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2015-7705 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2015-7705.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2015-7705" }, { "cve": "CVE-2015-7853", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2015-7853 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2015-7853.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2015-7853" }, { "cve": "CVE-2015-8138", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2015-8138 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2015-8138.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2015-8138" }, { "cve": "CVE-2016-1547", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-1547 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-1547.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-1547" }, { "cve": "CVE-2016-1548", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "notes": [ { "category": "summary", "text": "An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-\u003edst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-1548 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-1548.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-1548" }, { "cve": "CVE-2016-1550", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest key.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-1550 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-1550.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-1550" }, { "cve": "CVE-2016-2518", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-2518 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-2518.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-2518" }, { "cve": "CVE-2016-4953", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (ephemeral-association demobilization) by sending a spoofed crypto-NAK packet with incorrect authentication data at a certain time.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-4953 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-4953.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-4953" }, { "cve": "CVE-2016-4954", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-4954 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-4954.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-4954" }, { "cve": "CVE-2016-4955", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "ntpd in NTP 4.x before 4.2.8p8, when autokey is enabled, allows remote attackers to cause a denial of service (peer-variable clearing and association outage) by sending (1) a spoofed crypto-NAK packet or (2) a packet with an incorrect MAC value at a certain time.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-4955 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-4955.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-4955" }, { "cve": "CVE-2016-4956", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (interleaved-mode transition and time change) via a spoofed broadcast packet. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-1548.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-4956 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-4956.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-4956" }, { "cve": "CVE-2016-7431", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "NTP before 4.2.8p9 allows remote attackers to bypass the origin timestamp protection mechanism via an origin timestamp of zero. NOTE: this vulnerability exists because of a CVE-2015-8138 regression.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-7431 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-7431.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-7431" }, { "cve": "CVE-2016-7433", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "notes": [ { "category": "summary", "text": "NTP before 4.2.8p9 does not properly perform the initial sync calculations, which allows remote attackers to unspecified impact via unknown vectors, related to a \"root distance that did not include the peer dispersion.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-7433 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-7433.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-7433" }, { "cve": "CVE-2016-9042", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-9042 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-9042.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-9042" }, { "cve": "CVE-2017-6458", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2017-6458 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2017-6458.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2017-6458" } ] }
icsa-21-159-11
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting these vulnerabilities to CISA." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "notes": [ { "category": "summary", "text": "All versions of the SIMATIC CP 443-1 OPC UA contain multiple vulnerabilities in the underlying third party component NTP.\n\nSiemens recommends specific countermeasures for products where updates are not, or not yet available.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "other", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-211752: Multiple NTP-Client Related Vulnerabilities in SIMATIC CP 443-1 OPC UA - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-211752.json" }, { "category": "self", "summary": "SSA-211752: Multiple NTP-Client Related Vulnerabilities in SIMATIC CP 443-1 OPC UA - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-211752.txt" }, { "category": "self", "summary": "SSA-211752: Multiple NTP-Client Related Vulnerabilities in SIMATIC CP 443-1 OPC UA - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "category": "self", "summary": "ICS Advisory ICSA-21-159-11 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-159-11.json" }, { "category": "self", "summary": "ICS Advisory ICSA-21-159-11 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-159-11" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens SIMATIC NET CP 443-1 OPC UA", "tracking": { "current_release_date": "2025-05-06T06:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-21-159-11", "initial_release_date": "2021-06-08T00:00:00.000000Z", "revision_history": [ { "date": "2021-06-08T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2022-02-08T00:00:00.000000Z", "legacy_version": "1.1", "number": "2", "summary": "No remediation planned for SIMATIC CP 443-1 OPC UA" }, { "date": "2025-05-06T06:00:00.000000Z", "legacy_version": "Revision", "number": "3", "summary": "Revision - Fixing typos" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 443-1 OPC UA (6GK7443-1UX00-0XE0)", "product_id": "CSAFPID-0001", "product_identification_helper": { "model_numbers": [ "6GK7443-1UX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 443-1 OPC UA" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7705", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2015-7705 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2015-7705.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2015-7705" }, { "cve": "CVE-2015-7853", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2015-7853 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2015-7853.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2015-7853" }, { "cve": "CVE-2015-8138", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2015-8138 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2015-8138.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2015-8138" }, { "cve": "CVE-2016-1547", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-1547 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-1547.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-1547" }, { "cve": "CVE-2016-1548", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "notes": [ { "category": "summary", "text": "An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-\u003edst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-1548 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-1548.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-1548" }, { "cve": "CVE-2016-1550", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest key.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-1550 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-1550.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-1550" }, { "cve": "CVE-2016-2518", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-2518 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-2518.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-2518" }, { "cve": "CVE-2016-4953", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (ephemeral-association demobilization) by sending a spoofed crypto-NAK packet with incorrect authentication data at a certain time.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-4953 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-4953.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-4953" }, { "cve": "CVE-2016-4954", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-4954 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-4954.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-4954" }, { "cve": "CVE-2016-4955", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "ntpd in NTP 4.x before 4.2.8p8, when autokey is enabled, allows remote attackers to cause a denial of service (peer-variable clearing and association outage) by sending (1) a spoofed crypto-NAK packet or (2) a packet with an incorrect MAC value at a certain time.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-4955 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-4955.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-4955" }, { "cve": "CVE-2016-4956", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (interleaved-mode transition and time change) via a spoofed broadcast packet. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-1548.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-4956 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-4956.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-4956" }, { "cve": "CVE-2016-7431", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "NTP before 4.2.8p9 allows remote attackers to bypass the origin timestamp protection mechanism via an origin timestamp of zero. NOTE: this vulnerability exists because of a CVE-2015-8138 regression.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-7431 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-7431.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-7431" }, { "cve": "CVE-2016-7433", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "notes": [ { "category": "summary", "text": "NTP before 4.2.8p9 does not properly perform the initial sync calculations, which allows remote attackers to unspecified impact via unknown vectors, related to a \"root distance that did not include the peer dispersion.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-7433 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-7433.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-7433" }, { "cve": "CVE-2016-9042", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-9042 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-9042.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-9042" }, { "cve": "CVE-2017-6458", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2017-6458 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2017-6458.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2017-6458" } ] }
cnvd-2016-02669
Vulnerability from cnvd
目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接: http://support.ntp.org/bin/view/Main/NtpBug3009
Name | ['Ntp NTPd 4.x<4.2.8p7', 'Ntp NTPd >4.3,<4.3.92'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2016-2518" } }, "description": "ntpd\uff08Network Time Protocol daemon\uff09\u662f\u4e00\u4e2a\u64cd\u4f5c\u7cfb\u7edf\u5b88\u62a4\u8fdb\u7a0b\uff0c\u5b83\u4f7f\u7528\u7f51\u7edc\u65f6\u95f4\u534f\u8bae\uff08NTP\uff09\u4e0e\u65f6\u95f4\u670d\u52a1\u5668\u7684\u7cfb\u7edf\u65f6\u95f4\u4fdd\u6301\u540c\u6b65\u3002\r\n\r\nntpd 4.2.8p7\u4e4b\u524d4.x\u7248\u672c\u548c4.3.92\u4e4b\u524d4.3\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u53d1\u9001\u7279\u5236\u7684\u6570\u636e\u5305\uff0c\u521b\u5efa\u2018hmode\u2019\u503c\u5927\u4e8e7\u7684\u5bf9\u7b49\u4f53\u5229\u7528\u8be5\u6f0f\u6d1e\u89e6\u53d1MATCH_ASSOC()\u67e5\u8be2\uff0c\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u8d8a\u8fb9\u754c\u5f15\u7528\uff09\u3002", "discovererName": "Cisco TALOS", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttp://support.ntp.org/bin/view/Main/NtpBug3009", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2016-02669", "openTime": "2016-05-03", "patchDescription": "ntpd\uff08Network Time Protocol daemon\uff09\u662f\u4e00\u4e2a\u64cd\u4f5c\u7cfb\u7edf\u5b88\u62a4\u8fdb\u7a0b\uff0c\u5b83\u4f7f\u7528\u7f51\u7edc\u65f6\u95f4\u534f\u8bae\uff08NTP\uff09\u4e0e\u65f6\u95f4\u670d\u52a1\u5668\u7684\u7cfb\u7edf\u65f6\u95f4\u4fdd\u6301\u540c\u6b65\u3002\r\n\r\nntpd 4.2.8p7\u4e4b\u524d4.x\u7248\u672c\u548c4.3.92\u4e4b\u524d4.3\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u53d1\u9001\u7279\u5236\u7684\u6570\u636e\u5305\uff0c\u521b\u5efa\u2018hmode\u2019\u503c\u5927\u4e8e7\u7684\u5bf9\u7b49\u4f53\u5229\u7528\u8be5\u6f0f\u6d1e\u89e6\u53d1MATCH_ASSOC()\u67e5\u8be2\uff0c\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u8d8a\u8fb9\u754c\u5f15\u7528\uff09\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "ntpd\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2016-02669\uff09\u7684\u8865\u4e01", "products": { "product": [ "Ntp NTPd 4.x\u003c4.2.8p7", "Ntp NTPd \u003e4.3\uff0c\u003c4.3.92" ] }, "referenceLink": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security\r\nhttp://support.ntp.org/bin/view/Main/NtpBug3009\r\nhttp://www.kb.cert.org/vuls/id/718152", "serverity": "\u4e2d", "submitTime": "2016-04-28", "title": "ntpd\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2016-02669\uff09" }
ghsa-9cgg-qq3h-mgcv
Vulnerability from github
The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.
{ "affected": [], "aliases": [ "CVE-2016-2518" ], "database_specific": { "cwe_ids": [ "CWE-125" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-01-30T21:59:00Z", "severity": "MODERATE" }, "details": "The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.", "id": "GHSA-9cgg-qq3h-mgcv", "modified": "2025-04-20T03:32:03Z", "published": "2022-05-13T01:09:35Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2518" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2016:1141" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "type": "WEB", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201607-15" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20171004-0002" }, { "type": "WEB", "url": "https://support.f5.com/csp/article/K20804323" }, { "type": "WEB", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" }, { "type": "WEB", "url": "https://www.debian.org/security/2016/dsa-3629" }, { "type": "WEB", "url": "https://www.kb.cert.org/vuls/id/718152" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-1552.html" }, { "type": "WEB", "url": "http://support.ntp.org/bin/view/Main/NtpBug3009" }, { "type": "WEB", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_ntp_4_2_8p7_Security" }, { "type": "WEB", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd" }, { "type": "WEB", "url": "http://www.debian.org/security/2016/dsa-3629" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/538233/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/88226" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1035705" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3096-1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "type": "CVSS_V3" } ] }
fkie_cve-2016-2518
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
cve@mitre.org | http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html | ||
cve@mitre.org | http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html | ||
cve@mitre.org | http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html | ||
cve@mitre.org | http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html | ||
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2016-1552.html | Broken Link | |
cve@mitre.org | http://support.ntp.org/bin/view/Main/NtpBug3009 | Vendor Advisory | |
cve@mitre.org | http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_ntp_4_2_8p7_Security | Vendor Advisory | |
cve@mitre.org | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd | ||
cve@mitre.org | http://www.debian.org/security/2016/dsa-3629 | Third Party Advisory | |
cve@mitre.org | http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html | Patch, Third Party Advisory | |
cve@mitre.org | http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | Third Party Advisory | |
cve@mitre.org | http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html | Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/archive/1/538233/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/88226 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1035705 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.ubuntu.com/usn/USN-3096-1 | ||
cve@mitre.org | https://access.redhat.com/errata/RHSA-2016:1141 | Third Party Advisory | |
cve@mitre.org | https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf | Third Party Advisory | |
cve@mitre.org | https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc | Third Party Advisory | |
cve@mitre.org | https://security.gentoo.org/glsa/201607-15 | Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20171004-0002/ | Third Party Advisory | |
cve@mitre.org | https://support.f5.com/csp/article/K20804323 | ||
cve@mitre.org | https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11 | ||
cve@mitre.org | https://www.debian.org/security/2016/dsa-3629 | ||
cve@mitre.org | https://www.kb.cert.org/vuls/id/718152 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-1552.html | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.ntp.org/bin/view/Main/NtpBug3009 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_ntp_4_2_8p7_Security | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2016/dsa-3629 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/538233/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/88226 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1035705 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3096-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2016:1141 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201607-15 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20171004-0002/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K20804323 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2016/dsa-3629 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/718152 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
ntp | ntp | * | |
ntp | ntp | * | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
ntp | ntp | 4.2.8 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
netapp | clustered_data_ontap | - | |
netapp | data_ontap | - | |
netapp | oncommand_balance | - | |
netapp | oncommand_performance_manager | - | |
netapp | oncommand_unified_manager_for_clustered_data_ontap | - | |
oracle | communications_user_data_repository | 10.0.0 | |
oracle | communications_user_data_repository | 10.0.1 | |
oracle | communications_user_data_repository | 12.0.0 | |
oracle | linux | 6 | |
oracle | linux | 7 | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_server | 6.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_server_aus | 7.2 | |
redhat | enterprise_linux_server_aus | 7.4 | |
redhat | enterprise_linux_server_aus | 7.6 | |
redhat | enterprise_linux_server_eus | 7.2 | |
redhat | enterprise_linux_server_eus | 7.3 | |
redhat | enterprise_linux_server_eus | 7.4 | |
redhat | enterprise_linux_server_eus | 7.5 | |
redhat | enterprise_linux_server_eus | 7.6 | |
redhat | enterprise_linux_server_eus | 7.7 | |
redhat | enterprise_linux_server_tus | 7.2 | |
redhat | enterprise_linux_server_tus | 7.3 | |
redhat | enterprise_linux_server_tus | 7.6 | |
redhat | enterprise_linux_server_tus | 7.7 | |
redhat | enterprise_linux_workstation | 6.0 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 9.3 | |
freebsd | freebsd | 10.1 | |
freebsd | freebsd | 10.1 | |
freebsd | freebsd | 10.1 | |
freebsd | freebsd | 10.1 | |
freebsd | freebsd | 10.1 | |
freebsd | freebsd | 10.1 | |
freebsd | freebsd | 10.1 | |
freebsd | freebsd | 10.1 | |
freebsd | freebsd | 10.1 | |
freebsd | freebsd | 10.1 | |
freebsd | freebsd | 10.1 | |
freebsd | freebsd | 10.1 | |
freebsd | freebsd | 10.1 | |
freebsd | freebsd | 10.1 | |
freebsd | freebsd | 10.1 | |
freebsd | freebsd | 10.1 | |
freebsd | freebsd | 10.1 | |
freebsd | freebsd | 10.1 | |
freebsd | freebsd | 10.1 | |
freebsd | freebsd | 10.1 | |
freebsd | freebsd | 10.1 | |
freebsd | freebsd | 10.1 | |
freebsd | freebsd | 10.1 | |
freebsd | freebsd | 10.1 | |
freebsd | freebsd | 10.1 | |
freebsd | freebsd | 10.1 | |
freebsd | freebsd | 10.2 | |
freebsd | freebsd | 10.2 | |
freebsd | freebsd | 10.2 | |
freebsd | freebsd | 10.2 | |
freebsd | freebsd | 10.2 | |
freebsd | freebsd | 10.2 | |
freebsd | freebsd | 10.2 | |
freebsd | freebsd | 10.2 | |
freebsd | freebsd | 10.2 | |
freebsd | freebsd | 10.2 | |
freebsd | freebsd | 10.2 | |
freebsd | freebsd | 10.2 | |
freebsd | freebsd | 10.3 | |
siemens | simatic_net_cp_443-1_opc_ua_firmware | * | |
siemens | simatic_net_cp_443-1_opc_ua | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*", "matchCriteriaId": "CED3C1F7-6FFA-44D1-BC56-2BB1963F3B9F", "versionEndExcluding": "4.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A5D4FE7-07FC-4869-84F2-4FA767490A73", "versionEndExcluding": "4.3.92", "versionStartIncluding": "4.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*", "matchCriteriaId": "EEA51D83-5841-4335-AF07-7A43C118CAAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*", "matchCriteriaId": "C855BBD2-2B38-4EFF-9DBE-CA61CCACD0DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*", "matchCriteriaId": "49ADE0C3-F75C-4EC0-8805-56013F0EB92C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*", "matchCriteriaId": "D8FF625A-EFA3-43D1-8698-4A37AE31A07C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*", "matchCriteriaId": "E3B99BBD-97FE-4615-905A-A614592226F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*", "matchCriteriaId": "E7A9AD3A-F030-4331-B52A-518BD963AB8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*", "matchCriteriaId": "C293B8BE-6691-4944-BCD6-25EB98CABC73", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*", "matchCriteriaId": "CEA650F8-2576-494A-A861-61572CA319D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*", "matchCriteriaId": "4ED21EE8-7CBF-4BC5-BFC3-185D41296238", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*", "matchCriteriaId": "C76A0B44-13DE-4173-8D05-DA54F6A71759", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*", "matchCriteriaId": "1450241C-2F6D-4122-B33C-D78D065BA403", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*", "matchCriteriaId": "721AFD22-91D3-488E-A5E6-DD84C86E412B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*", "matchCriteriaId": "8D6ADDB1-2E96-4FF6-AE95-4B06654D38B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*", "matchCriteriaId": "41E44E9F-6383-4E12-AEDC-B653FEA77A48", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*", "matchCriteriaId": "466D9A37-2658-4695-9429-0C6BF4A631C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*", "matchCriteriaId": "99774181-5F12-446C-AC2C-DB1C52295EED", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*", "matchCriteriaId": "4427EE6D-3F79-4FF5-B3EC-EE6BD01562CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p4:*:*:*:*:*:*", "matchCriteriaId": "99C71C00-7222-483B-AEFB-159337BD3C92", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p5:*:*:*:*:*:*", "matchCriteriaId": "75A9AA28-1B20-44BB-815C-7294A53E910E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p6:*:*:*:*:*:*", "matchCriteriaId": "8C213794-111D-41F3-916C-AD97F731D600", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p7:*:*:*:*:*:*", "matchCriteriaId": "50811A7B-0379-4437-8737-B4C1ACBC9EFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.2.8:p8:*:*:*:*:*:*", "matchCriteriaId": "F12E4CF5-536C-416B-AD8D-6AE7CBE22C71", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FE996B1-6951-4F85-AA58-B99A379D2163", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:data_ontap:-:*:*:*:*:7-mode:*:*", "matchCriteriaId": "6C2ACC32-5147-4EA5-95BE-B6B4EAB3D82B", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DCBCC5D-C396-47A8-ADF4-D3A2C4377FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*", "matchCriteriaId": "212E1878-1B9A-4CB4-A1CE-EAD60B867161", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_unified_manager_for_clustered_data_ontap:-:*:*:*:*:*:*:*", "matchCriteriaId": "392D82A3-21BC-4CE1-A0AC-62A90468F0A5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:communications_user_data_repository:10.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6D2C3F5-73E2-4988-9416-940C3C09F25F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_user_data_repository:10.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0473C6C9-B0C5-43F0-AC8C-C0DAD30DACF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_user_data_repository:12.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0E94636C-58E3-4B5C-9B18-E5129F6B4A11", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*", "matchCriteriaId": "D7B037A8-72A6-4DFF-94B2-D688A5F6F876", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*", "matchCriteriaId": "44B8FEDF-6CB0-46E9-9AD7-4445B001C158", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C8D871B-AEA1-4407-AEE3-47EC782250FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "44B067C7-735E-43C9-9188-7E1522A02491", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "A8442C20-41F9-47FD-9A12-E724D3A31FD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "BF77CDCF-B9C9-427D-B2BF-36650FB2148C", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "21690BAC-2129-4A33-9B48-1F3BF30072A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6755B6AD-0422-467B-8115-34A60B1D1A40", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "17F256A9-D3B9-4C72-B013-4EFD878BFEA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:-:*:*:*:*:*:*", "matchCriteriaId": "A308448F-7FAD-4CAA-B204-94979A0055EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p1:*:*:*:*:*:*", "matchCriteriaId": "9D942069-86FD-4777-B144-27F68845510F", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p10:*:*:*:*:*:*", "matchCriteriaId": "8BCB79FA-CF26-4DA9-BE6B-DB38F4BD76DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p12:*:*:*:*:*:*", "matchCriteriaId": "6937683B-ADC8-452E-BCD7-34ED8656D75E", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p13:*:*:*:*:*:*", "matchCriteriaId": "0B50A898-C510-4582-8931-2820D2FFB646", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p16:*:*:*:*:*:*", "matchCriteriaId": "5016E4BB-D905-49BF-8B23-40DD9F9BC133", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p19:*:*:*:*:*:*", "matchCriteriaId": "C4009691-42D4-4E04-BA72-EAC9E30C30E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p2:*:*:*:*:*:*", "matchCriteriaId": "AC531D8E-31B3-48B1-8B79-85B9FB67CF0E", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p20:*:*:*:*:*:*", "matchCriteriaId": "4B161FA9-E1A8-407B-80A9-9F57DF4E6932", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p21:*:*:*:*:*:*", "matchCriteriaId": "C608B9D9-28DD-4470-A5A2-96B030E8EA0D", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p22:*:*:*:*:*:*", "matchCriteriaId": "50702FA4-624E-4C47-B672-8479ED7EB00C", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p23:*:*:*:*:*:*", "matchCriteriaId": "A05DE064-17DC-4BC3-BFA7-1FF31324BB5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p24:*:*:*:*:*:*", "matchCriteriaId": "3785D821-D809-4948-92E0-CD6F93D06D56", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p25:*:*:*:*:*:*", "matchCriteriaId": "4F309C4D-DBE9-4FDC-9F71-670FE84E8859", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p28:*:*:*:*:*:*", "matchCriteriaId": "F6DF73AA-4270-46C1-BD19-EE0EAE39B6EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p3:*:*:*:*:*:*", "matchCriteriaId": "B9D919A6-BBEC-416C-8FC0-5CA7B0191E82", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p30:*:*:*:*:*:*", "matchCriteriaId": "BC7FC9A7-46A4-4BEC-AD3D-4E986BBB4B1A", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p31:*:*:*:*:*:*", "matchCriteriaId": "6C1380CA-757C-442D-A15E-7C1EEF309BC2", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p32:*:*:*:*:*:*", "matchCriteriaId": "B4E26747-28E7-46C6-B9D2-949E7D2B9076", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p33:*:*:*:*:*:*", "matchCriteriaId": "0D16FE35-E17F-4520-B2AA-916F586DE052", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p34:*:*:*:*:*:*", "matchCriteriaId": "02A6E6C3-1DBF-41C5-8377-A3058AF1A1A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p35:*:*:*:*:*:*", "matchCriteriaId": "168BEEE1-3401-4831-B32A-19874B1C185E", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p36:*:*:*:*:*:*", "matchCriteriaId": "FE660FBA-AD88-485E-B77B-94513E9CC660", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p38:*:*:*:*:*:*", "matchCriteriaId": "04E25F11-56B2-4F49-913A-57FC58EBD87E", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p39:*:*:*:*:*:*", "matchCriteriaId": "B144DAC7-1B42-4DC2-AE46-6D3AD3296A43", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p5:*:*:*:*:*:*", "matchCriteriaId": "22A2F317-2F1A-4D3F-8E31-B5ABFCEE2AAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p6:*:*:*:*:*:*", "matchCriteriaId": "179468E8-0FB7-4E1A-9002-AFC8753027AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p7:*:*:*:*:*:*", "matchCriteriaId": "CF8563F3-DD91-4272-B72D-08F66E2E44C7", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p8:*:*:*:*:*:*", "matchCriteriaId": "642BCA8F-6432-43D2-9E74-565CC71A9DD1", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:9.3:p9:*:*:*:*:*:*", "matchCriteriaId": "09003BFB-72FB-4F89-B62C-4A2505E60630", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:-:*:*:*:*:*:*", "matchCriteriaId": "794DB6C2-514F-4353-AC31-025D53FFC3FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p1:*:*:*:*:*:*", "matchCriteriaId": "55448583-DD8E-44FA-9033-CEB8E63FC2C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p10:*:*:*:*:*:*", "matchCriteriaId": "A238C1FE-D4D3-4EEC-ACBE-341B112123EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p12:*:*:*:*:*:*", "matchCriteriaId": "BABAD599-782F-4BFE-9EE2-0668ECAAC349", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p15:*:*:*:*:*:*", "matchCriteriaId": "C263C188-EA00-4110-B9A5-16C0CD0F1DE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p16:*:*:*:*:*:*", "matchCriteriaId": "75F93217-BCD4-4AD4-9621-49C83BA3FFD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p17:*:*:*:*:*:*", "matchCriteriaId": "1860A2E7-8E58-4082-9C71-E4F383244953", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p18:*:*:*:*:*:*", "matchCriteriaId": "B07FABAF-00CF-4284-AAC2-F3D6DA3D3841", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p19:*:*:*:*:*:*", "matchCriteriaId": "87440763-A4AF-44E9-AB26-155313A64269", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p2:*:*:*:*:*:*", "matchCriteriaId": "5F2A6E84-E37B-4E21-BBD9-FDB878D53D58", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p22:*:*:*:*:*:*", "matchCriteriaId": "2D5B97BE-4A7F-4482-8A7F-A7DB5314CEA6", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p24:*:*:*:*:*:*", "matchCriteriaId": "256FDB00-0427-4B72-B9FA-1FE4AD56EC28", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p25:*:*:*:*:*:*", "matchCriteriaId": "5EC0C4BA-089F-44B1-A49B-2CDDEC86997B", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p26:*:*:*:*:*:*", "matchCriteriaId": "F7713F76-A9C7-498B-BEEC-B022D13268A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p27:*:*:*:*:*:*", "matchCriteriaId": "E51647B0-B346-4FCB-97BE-22D43D002B17", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p28:*:*:*:*:*:*", "matchCriteriaId": "AD84262A-7EBA-4E69-84C0-401D2FF33145", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p29:*:*:*:*:*:*", "matchCriteriaId": "40325D25-ECE7-486E-B654-EAEA69E3D97D", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p3:*:*:*:*:*:*", "matchCriteriaId": "D5F7A00A-5A6B-46FA-8527-14917C50555A", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p30:*:*:*:*:*:*", "matchCriteriaId": "CBD1A05A-5BBF-4C18-A5E0-E3A938D0D44C", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p31:*:*:*:*:*:*", "matchCriteriaId": "8A8EDDD7-9BE0-4C11-B3E2-6BC63984DA23", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p4:*:*:*:*:*:*", "matchCriteriaId": "466EA7B2-FBAF-4325-AD99-F5F4B0E5C0AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p5:*:*:*:*:*:*", "matchCriteriaId": "EAD3F82B-E13C-40CE-BF65-4DA204FCDE93", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p6:*:*:*:*:*:*", "matchCriteriaId": "23E2935E-7159-45A2-9164-978453F24BDD", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p7:*:*:*:*:*:*", "matchCriteriaId": "1B7F75CF-F808-4BD6-9A46-AA5C1989F740", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p8:*:*:*:*:*:*", "matchCriteriaId": "3EC40899-2775-45B9-96C1-8A9E7FAB7A64", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.1:p9:*:*:*:*:*:*", "matchCriteriaId": "A22BC7A2-BA8D-4C1D-A51A-7DF7EDEDDCC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.2:-:*:*:*:*:*:*", "matchCriteriaId": "C1C1DA92-2184-4FB0-8392-AF80E7D6EB2E", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.2:p1:*:*:*:*:*:*", "matchCriteriaId": "C59FCA1F-C2F9-4E11-A457-7979C94ECD3D", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.2:p10:*:*:*:*:*:*", "matchCriteriaId": "13BA0876-9EFB-474E-83BB-9A53F38ADD4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.2:p11:*:*:*:*:*:*", "matchCriteriaId": "B757D006-B0C5-4992-A1D7-2EB26C9A36D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.2:p12:*:*:*:*:*:*", "matchCriteriaId": "D07D5215-F475-42BA-B9B0-395628646C41", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.2:p13:*:*:*:*:*:*", "matchCriteriaId": "F0EED80F-53F4-46AA-B76E-FBF158D16544", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.2:p14:*:*:*:*:*:*", "matchCriteriaId": "375EAFDB-9E71-4EE8-9BDA-77FF831F2E06", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.2:p2:*:*:*:*:*:*", "matchCriteriaId": "041C28B8-8EA6-461D-B6CB-13E3B9FF8411", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.2:p5:*:*:*:*:*:*", "matchCriteriaId": "91362F1A-CB09-4505-A724-332C743D9624", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.2:p7:*:*:*:*:*:*", "matchCriteriaId": "D7F738CA-C3F4-4A30-9FF6-F0BD1DC1CC84", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.2:p8:*:*:*:*:*:*", "matchCriteriaId": "44685E95-3139-4A82-9A8B-EB5379DF0558", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.2:p9:*:*:*:*:*:*", "matchCriteriaId": "8F92482C-F8B9-47A7-B5F1-ACBAC2A91646", "vulnerable": true }, { "criteria": "cpe:2.3:o:freebsd:freebsd:10.3:-:*:*:*:*:*:*", "matchCriteriaId": "E30CCEF8-E86A-482F-A77B-175F106D354E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_net_cp_443-1_opc_ua_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "22EFD09A-3D77-47B0-93FB-50F6C13A2F9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_net_cp_443-1_opc_ua:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F488810-73E3-4475-975A-C2FCA037E78B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value." }, { "lang": "es", "value": "La funci\u00f3n MATCH_ASSOC en NTP en versiones anteriores 4.2.8p9 y 4.3.x en versiones anteriores a 4.3.92 permite a atacantes remotos provocar una referencia fuera de los l\u00edmites a trav\u00e9s de una solicitud addpeer con un valor hmode grande." } ], "id": "CVE-2016-2518", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-01-30T21:59:01.080", "references": [ { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" }, { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1552.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug3009" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_ntp_4_2_8p7_Security" }, { "source": "cve@mitre.org", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3629" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/538233/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/88226" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1035705" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-3096-1" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2016:1141" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201607-15" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "source": "cve@mitre.org", "url": "https://support.f5.com/csp/article/K20804323" }, { "source": "cve@mitre.org", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" }, { "source": "cve@mitre.org", "url": "https://www.debian.org/security/2016/dsa-3629" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/718152" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183647.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184669.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00037.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00052.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/136864/Slackware-Security-Advisory-ntp-Updates.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1552.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug3009" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_ntp_4_2_8p7_Security" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3629" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/538233/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/archive/1/538233/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/88226" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1035705" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-3096-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2016:1141" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:16.ntp.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201607-15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.f5.com/csp/article/K20804323" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2016/dsa-3629" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/718152" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.