Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-8138 (GCVE-0-2015-8138)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:13:31.677Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd" }, { "name": "USN-3096-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3096-1" }, { "name": "SUSE-SU-2016:1177", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" }, { "name": "DSA-3629", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3629" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03766en_us" }, { "name": "SUSE-SU-2016:1912", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" }, { "name": "1034782", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034782" }, { "name": "openSUSE-SU-2016:1292", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" }, { "name": "VU#718152", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/718152" }, { "name": "SUSE-SU-2016:1247", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" }, { "name": "RHSA-2016:0063", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0063.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03750en_us" }, { "name": "FEDORA-2016-8bb1932088", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176434.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20171031-0001/" }, { "name": "SUSE-SU-2016:1311", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" }, { "name": "20160428 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: April 2016", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd" }, { "name": "20161123 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: November 2016", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161123-ntpd" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "name": "FEDORA-2016-34bc10a2c8", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.html" }, { "name": "SUSE-SU-2016:2094", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" }, { "name": "SUSE-SU-2016:1175", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" }, { "name": "81811", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/81811" }, { "name": "FreeBSD-SA-16:09", "tags": [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bto.bluecoat.com/security-advisory/sa113" }, { "name": "openSUSE-SU-2016:1423", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" }, { "name": "GLSA-201607-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201607-15" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-01-27T00:00:00", "descriptions": [ { "lang": "en", "value": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-05T17:23:16", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd" }, { "name": "USN-3096-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3096-1" }, { "name": "SUSE-SU-2016:1177", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" }, { "name": "DSA-3629", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3629" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03766en_us" }, { "name": "SUSE-SU-2016:1912", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" }, { "name": "1034782", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034782" }, { "name": "openSUSE-SU-2016:1292", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" }, { "name": "VU#718152", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/718152" }, { "name": "SUSE-SU-2016:1247", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" }, { "name": "RHSA-2016:0063", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0063.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03750en_us" }, { "name": "FEDORA-2016-8bb1932088", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176434.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20171031-0001/" }, { "name": "SUSE-SU-2016:1311", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" }, { "name": "20160428 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: April 2016", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd" }, { "name": "20161123 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: November 2016", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161123-ntpd" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "name": "FEDORA-2016-34bc10a2c8", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.html" }, { "name": "SUSE-SU-2016:2094", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" }, { "name": "SUSE-SU-2016:1175", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" }, { "name": "81811", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/81811" }, { "name": "FreeBSD-SA-16:09", "tags": [ "vendor-advisory", "x_refsource_FREEBSD" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bto.bluecoat.com/security-advisory/sa113" }, { "name": "openSUSE-SU-2016:1423", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" }, { "name": "GLSA-201607-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201607-15" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8138", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd" }, { "name": "USN-3096-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3096-1" }, { "name": "SUSE-SU-2016:1177", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" }, { "name": "DSA-3629", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3629" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03766en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03766en_us" }, { "name": "SUSE-SU-2016:1912", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" }, { "name": "1034782", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034782" }, { "name": "openSUSE-SU-2016:1292", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" }, { "name": "VU#718152", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/718152" }, { "name": "SUSE-SU-2016:1247", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" }, { "name": "RHSA-2016:0063", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0063.html" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03750en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03750en_us" }, { "name": "FEDORA-2016-8bb1932088", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176434.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "https://security.netapp.com/advisory/ntap-20171004-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "name": "https://security.netapp.com/advisory/ntap-20171031-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20171031-0001/" }, { "name": "SUSE-SU-2016:1311", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" }, { "name": "20160428 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: April 2016", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd" }, { "name": "20161123 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: November 2016", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161123-ntpd" }, { "name": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "refsource": "CONFIRM", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "name": "FEDORA-2016-34bc10a2c8", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.html" }, { "name": "SUSE-SU-2016:2094", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" }, { "name": "SUSE-SU-2016:1175", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" }, { "name": "81811", "refsource": "BID", "url": "http://www.securityfocus.com/bid/81811" }, { "name": "FreeBSD-SA-16:09", "refsource": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc" }, { "name": "https://bto.bluecoat.com/security-advisory/sa113", "refsource": "CONFIRM", "url": "https://bto.bluecoat.com/security-advisory/sa113" }, { "name": "openSUSE-SU-2016:1423", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" }, { "name": "GLSA-201607-15", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201607-15" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8138", "datePublished": "2017-01-30T21:00:00", "dateReserved": "2015-11-13T00:00:00", "dateUpdated": "2024-08-06T08:13:31.677Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-8138\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-01-30T21:59:00.723\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.\"},{\"lang\":\"es\",\"value\":\"NTP en versiones anteriores a 4.2.8p6 y 4.3.x en versiones anteriores a 4.3.90 permite a atacantes remotos eludir la validaci\u00f3n de marca horaria de origen a trav\u00e9s de un paquete con una marca horaria de origen puesta a cero.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:*:p5:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.2.8\",\"matchCriteriaId\":\"99442254-E77A-43F7-8A9B-FC918AC336A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C1CCF6F-74C6-42D7-B88B-36ED73BB1F8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B23D9009-DF45-44C1-80DF-CEEC9B9E3F20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43921601-667E-4415-83BE-E5B39D969BD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75DD9C02-0C46-4785-8D77-C5465E4ED967\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A497BADE-0516-494F-89FA-EAFC6AD17F7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4298439A-EAF2-4CAA-990B-4AA37E7A0E8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30E9C822-C04A-4908-9596-76F9FB561206\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12EBD400-8EC1-4F9C-B600-85B8FF3BDEA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE6CFF4C-2620-4FD6-91A2-C0D0DAA4287D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"121ED6C5-8985-4DEF-9040-2AC63582E596\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"566B4B99-8B4F-4ED8-B2DC-D90EC71ECB99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68499DA4-64EF-412F-A434-8E0F78D77CE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"836C5AC9-463F-4703-81B9-7B5484F47A5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FED14811-8F49-4796-BADD-DB7973EC32DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4EB2830-ADE5-4C87-964E-16748BF88EF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C0284FD-2933-4160-80D2-53B32CD73287\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9AB963A-7284-433F-9890-5AE402E4E000\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEDEFF7A-D964-4D9A-93BF-41E9D16EA793\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C434153-911C-4F07-ADD0-0EAB47F96E89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8183B043-8B96-4A8B-A5C9-544D4F1CED8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DE349AB-44CB-4263-80CE-59DFD572B363\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DB55DF6-567F-4B6A-81E1-9013914416D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80727B0B-AB5E-46CC-9DDF-F319C2D9B242\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0755962-2D5F-41E6-9BDB-C2ECBCCD2818\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EBAADB5-FA32-4CF9-A4B2-51EEA300B0EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A202FDAD-D757-4850-9D1E-C31B0F3BA718\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6A345D7-DFC0-4E0D-AAAB-8206C35F63D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4069EF5-DC7D-4487-8636-AC2EAB17BAC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73DF3A5C-F1D9-468E-BD08-5E2578898DEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0858AE44-4B0A-4941-B4A8-937B557D1448\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"979C84FF-CB21-4819-B3CA-1A55FDF20BD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94709B39-C394-4B44-A362-9429F4CB9D50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E4526AC-6BCC-43A5-B501-263D0ED0655B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E04FF6B4-CD1C-4AC1-B286-D6AB705D680B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FAFA0C8-1349-43A4-BDAC-3B5A601B9FDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BA130B1-DD20-4E98-963F-61E85A09E29E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AAC9B73-5020-47C9-803E-ABB6162AADE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2A6B7B5-3AC9-4442-BD91-3783C2B4235C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D72F5C09-520B-486C-AD9A-9CBBFE6487CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"097DED37-D3F3-45C4-B131-1C4294406722\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A4F607-0A9D-4F84-B50D-28C54E6EDC06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C689CAF-632A-4FF2-8C86-541EEDD574E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B0ACF5B-BBA9-4B6C-B19D-B8AEF7212781\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E09C8254-73DC-4AFA-A250-A8192DC917F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D344FA12-3C5F-418B-9209-EA8BDD230074\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1C3A62A-C6F6-4B2E-A254-CDA12BD34DBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"073A0AFF-C5C6-422E-BD63-2353AA4B58E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59B5DA29-4139-405D-8AA8-23FAECBBC5CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73F4D15D-6D2A-4730-B7CF-21284E92FEFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79A0C6AB-813F-4417-A98E-33FBB7AAB939\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"815ABF0E-ED94-4426-8889-D3C2AECACC26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"894612F1-8C51-4F66-AFE7-D8077F63E562\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63FD3D1E-08F8-4C7F-876C-47E88386B83E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C068E27-A3DD-4FD2-81FB-2CFEC3C047CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E21A12E6-0802-4BDC-AF71-50D7D0433B87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC7EE44A-7D8B-41A5-82A6-04AEE50278CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6862529A-1AE5-4E2D-A4B0-E351D1900C64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C6B6711-0F75-4FEA-8917-04391FC9D378\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AC0249C-3CFC-4CD3-9481-9F6BE1FC5E31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BE639D9-0B1E-4DFB-B275-D11665FDA4AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B35E9C41-0F2A-4790-B996-8EC00FA863F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28BAB268-3A70-4422-9C6C-49E6453D750D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A5960F1-DDA9-4885-952F-450EC00B5C9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E725D449-BBC2-40E3-BF53-D9BF7B4F57D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.65:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B10975CB-56EB-44D0-BDEF-60484B6BD85E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.66:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EE56C0F-0AF4-45CF-ACA2-0E583BBB3187\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.67:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16A4A1AC-ED08-4EFE-A826-1BB1B5CAB34E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.68:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF9D7AD6-6BDB-4519-B9F8-3181E21850FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.69:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B061FF9A-0D00-429D-9B2F-14EEA41E7A33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6CB0260-2A96-41A8-81A0-8E9722B22D87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.71:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE037065-9E33-4A5A-8188-1F086D7BE394\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70200031-5902-416D-A140-DC2CDFDAF683\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.73:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"575C5F15-2C16-4B39-A718-1641DDD88F84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.74:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E7BFD7E-9B3F-4D63-BEBC-16F22DA6F8E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42631437-772B-45E0-A1F3-5D9E2FC77D19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.76:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA9E62EF-E21F-421F-9A57-54A551CEC441\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.77:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"871E046E-013A-4E10-9457-4D1F407519EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.78:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5E4B06F-AD55-4D61-B966-B38B854C0A75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.79:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19817731-42C2-4745-88F2-D27258FC7DB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.80:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77479EEE-F81B-4653-8FAD-0AFBA3C71B09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.81:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0208619E-9179-46D9-8E47-6CB5B4046DF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.82:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FBAE2A2-B7CB-45F6-A84C-5B9B742A0B56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.83:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CC16904-03FC-42B2-89F0-CA0D59A5FB91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.84:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E3980D1-54F1-4C2F-B140-B2F18D8958A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.85:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C845718-520A-42CB-9BA7-00723694A01F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.86:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAB7BF51-DD1A-41E1-B5E5-02A6BADC30DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.87:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"431DA557-0977-43C2-8DEF-127B1BAA9F46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.88:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"733C0A5D-3A0A-4449-9DE0-BD06D4942799\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.3.89:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9E5DAD5-465A-4A53-856A-1F674723EB00\"}]}]}],\"references\":[{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176434.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0063.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3629\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/81811\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1034782\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3096-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bto.bluecoat.com/security-advisory/sa113\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03750en_us\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03766en_us\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/201607-15\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20171004-0002/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20171031-0001/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161123-ntpd\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.kb.cert.org/vuls/id/718152\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176434.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0063.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3629\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/81811\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1034782\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3096-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bto.bluecoat.com/security-advisory/sa113\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03750en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03766en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201607-15\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20171004-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20171031-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161123-ntpd\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.kb.cert.org/vuls/id/718152\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}" } }
opensuse-su-2024:10181-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ntp-4.2.8p9-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ntp-4.2.8p9-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10181", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10181-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2009-0159 page", "url": "https://www.suse.com/security/cve/CVE-2009-0159/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-1252 page", "url": "https://www.suse.com/security/cve/CVE-2009-1252/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-5211 page", "url": "https://www.suse.com/security/cve/CVE-2013-5211/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9293 page", "url": "https://www.suse.com/security/cve/CVE-2014-9293/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9294 page", "url": "https://www.suse.com/security/cve/CVE-2014-9294/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9295 page", "url": "https://www.suse.com/security/cve/CVE-2014-9295/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9296 page", "url": "https://www.suse.com/security/cve/CVE-2014-9296/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9297 page", "url": "https://www.suse.com/security/cve/CVE-2014-9297/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9298 page", "url": "https://www.suse.com/security/cve/CVE-2014-9298/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1798 page", "url": "https://www.suse.com/security/cve/CVE-2015-1798/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1799 page", "url": "https://www.suse.com/security/cve/CVE-2015-1799/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5300 page", "url": "https://www.suse.com/security/cve/CVE-2015-5300/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7691 page", "url": "https://www.suse.com/security/cve/CVE-2015-7691/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7692 page", "url": "https://www.suse.com/security/cve/CVE-2015-7692/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7701 page", "url": "https://www.suse.com/security/cve/CVE-2015-7701/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7702 page", "url": "https://www.suse.com/security/cve/CVE-2015-7702/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7703 page", "url": "https://www.suse.com/security/cve/CVE-2015-7703/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7704 page", "url": "https://www.suse.com/security/cve/CVE-2015-7704/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7705 page", "url": "https://www.suse.com/security/cve/CVE-2015-7705/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7848 page", "url": "https://www.suse.com/security/cve/CVE-2015-7848/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7849 page", "url": "https://www.suse.com/security/cve/CVE-2015-7849/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7850 page", "url": "https://www.suse.com/security/cve/CVE-2015-7850/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7851 page", "url": "https://www.suse.com/security/cve/CVE-2015-7851/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7852 page", "url": "https://www.suse.com/security/cve/CVE-2015-7852/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7853 page", "url": "https://www.suse.com/security/cve/CVE-2015-7853/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7854 page", "url": "https://www.suse.com/security/cve/CVE-2015-7854/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7855 page", "url": "https://www.suse.com/security/cve/CVE-2015-7855/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7871 page", "url": "https://www.suse.com/security/cve/CVE-2015-7871/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7973 page", "url": "https://www.suse.com/security/cve/CVE-2015-7973/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7974 page", "url": "https://www.suse.com/security/cve/CVE-2015-7974/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7975 page", "url": "https://www.suse.com/security/cve/CVE-2015-7975/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7976 page", "url": "https://www.suse.com/security/cve/CVE-2015-7976/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7977 page", "url": "https://www.suse.com/security/cve/CVE-2015-7977/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7978 page", "url": "https://www.suse.com/security/cve/CVE-2015-7978/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7979 page", "url": "https://www.suse.com/security/cve/CVE-2015-7979/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8138 page", "url": "https://www.suse.com/security/cve/CVE-2015-8138/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8158 page", "url": "https://www.suse.com/security/cve/CVE-2015-8158/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1547 page", "url": "https://www.suse.com/security/cve/CVE-2016-1547/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1548 page", "url": "https://www.suse.com/security/cve/CVE-2016-1548/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1549 page", "url": "https://www.suse.com/security/cve/CVE-2016-1549/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1550 page", "url": "https://www.suse.com/security/cve/CVE-2016-1550/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1551 page", "url": "https://www.suse.com/security/cve/CVE-2016-1551/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2516 page", "url": "https://www.suse.com/security/cve/CVE-2016-2516/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2517 page", "url": "https://www.suse.com/security/cve/CVE-2016-2517/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2518 page", "url": "https://www.suse.com/security/cve/CVE-2016-2518/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2519 page", "url": "https://www.suse.com/security/cve/CVE-2016-2519/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4953 page", "url": "https://www.suse.com/security/cve/CVE-2016-4953/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4954 page", "url": "https://www.suse.com/security/cve/CVE-2016-4954/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4955 page", "url": "https://www.suse.com/security/cve/CVE-2016-4955/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4956 page", "url": "https://www.suse.com/security/cve/CVE-2016-4956/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4957 page", "url": "https://www.suse.com/security/cve/CVE-2016-4957/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7426 page", "url": "https://www.suse.com/security/cve/CVE-2016-7426/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7427 page", "url": "https://www.suse.com/security/cve/CVE-2016-7427/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7428 page", "url": "https://www.suse.com/security/cve/CVE-2016-7428/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7429 page", "url": "https://www.suse.com/security/cve/CVE-2016-7429/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7431 page", "url": "https://www.suse.com/security/cve/CVE-2016-7431/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7433 page", "url": "https://www.suse.com/security/cve/CVE-2016-7433/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7434 page", "url": "https://www.suse.com/security/cve/CVE-2016-7434/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9310 page", "url": "https://www.suse.com/security/cve/CVE-2016-9310/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9311 page", "url": "https://www.suse.com/security/cve/CVE-2016-9311/" } ], "title": "ntp-4.2.8p9-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10181-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p9-1.1.aarch64", "product": { "name": "ntp-4.2.8p9-1.1.aarch64", "product_id": "ntp-4.2.8p9-1.1.aarch64" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p9-1.1.aarch64", "product": { "name": "ntp-doc-4.2.8p9-1.1.aarch64", "product_id": "ntp-doc-4.2.8p9-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p9-1.1.ppc64le", "product": { "name": "ntp-4.2.8p9-1.1.ppc64le", "product_id": "ntp-4.2.8p9-1.1.ppc64le" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p9-1.1.ppc64le", "product": { "name": "ntp-doc-4.2.8p9-1.1.ppc64le", "product_id": "ntp-doc-4.2.8p9-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p9-1.1.s390x", "product": { "name": "ntp-4.2.8p9-1.1.s390x", "product_id": "ntp-4.2.8p9-1.1.s390x" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p9-1.1.s390x", "product": { "name": "ntp-doc-4.2.8p9-1.1.s390x", "product_id": "ntp-doc-4.2.8p9-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p9-1.1.x86_64", "product": { "name": "ntp-4.2.8p9-1.1.x86_64", "product_id": "ntp-4.2.8p9-1.1.x86_64" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p9-1.1.x86_64", "product": { "name": "ntp-doc-4.2.8p9-1.1.x86_64", "product_id": "ntp-doc-4.2.8p9-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p9-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64" }, "product_reference": "ntp-4.2.8p9-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p9-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le" }, "product_reference": "ntp-4.2.8p9-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p9-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x" }, "product_reference": "ntp-4.2.8p9-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p9-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64" }, "product_reference": "ntp-4.2.8p9-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p9-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64" }, "product_reference": "ntp-doc-4.2.8p9-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p9-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le" }, "product_reference": "ntp-doc-4.2.8p9-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p9-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x" }, "product_reference": "ntp-doc-4.2.8p9-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p9-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" }, "product_reference": "ntp-doc-4.2.8p9-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-0159" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-0159", "url": "https://www.suse.com/security/cve/CVE-2009-0159" }, { "category": "external", "summary": "SUSE Bug 484653 for CVE-2009-0159", "url": "https://bugzilla.suse.com/484653" }, { "category": "external", "summary": "SUSE Bug 501632 for CVE-2009-0159", "url": "https://bugzilla.suse.com/501632" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2009-0159" }, { "cve": "CVE-2009-1252", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-1252" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in ntpd in NTP before 4.2.4p7 and 4.2.5 before 4.2.5p74, when OpenSSL and autokey are enabled, allows remote attackers to execute arbitrary code via a crafted packet containing an extension field.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-1252", "url": "https://www.suse.com/security/cve/CVE-2009-1252" }, { "category": "external", "summary": "SUSE Bug 501632 for CVE-2009-1252", "url": "https://bugzilla.suse.com/501632" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2009-1252" }, { "cve": "CVE-2013-5211", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-5211" } ], "notes": [ { "category": "general", "text": "The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-5211", "url": "https://www.suse.com/security/cve/CVE-2013-5211" }, { "category": "external", "summary": "SUSE Bug 857195 for CVE-2013-5211", "url": "https://bugzilla.suse.com/857195" }, { "category": "external", "summary": "SUSE Bug 889447 for CVE-2013-5211", "url": "https://bugzilla.suse.com/889447" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2013-5211", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-5211" }, { "cve": "CVE-2014-9293", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9293" } ], "notes": [ { "category": "general", "text": "The config_auth function in ntpd in NTP before 4.2.7p11, when an auth key is not configured, improperly generates a key, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9293", "url": "https://www.suse.com/security/cve/CVE-2014-9293" }, { "category": "external", "summary": "SUSE Bug 910764 for CVE-2014-9293", "url": "https://bugzilla.suse.com/910764" }, { "category": "external", "summary": "SUSE Bug 911053 for CVE-2014-9293", "url": "https://bugzilla.suse.com/911053" }, { "category": "external", "summary": "SUSE Bug 911792 for CVE-2014-9293", "url": "https://bugzilla.suse.com/911792" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2014-9293", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-9293" }, { "cve": "CVE-2014-9294", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9294" } ], "notes": [ { "category": "general", "text": "util/ntp-keygen.c in ntp-keygen in NTP before 4.2.7p230 uses a weak RNG seed, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9294", "url": "https://www.suse.com/security/cve/CVE-2014-9294" }, { "category": "external", "summary": "SUSE Bug 910764 for CVE-2014-9294", "url": "https://bugzilla.suse.com/910764" }, { "category": "external", "summary": "SUSE Bug 911053 for CVE-2014-9294", "url": "https://bugzilla.suse.com/911053" }, { "category": "external", "summary": "SUSE Bug 911792 for CVE-2014-9294", "url": "https://bugzilla.suse.com/911792" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2014-9294", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-9294" }, { "cve": "CVE-2014-9295", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9295" } ], "notes": [ { "category": "general", "text": "Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers to execute arbitrary code via a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata function, and (3) the configure function.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9295", "url": "https://www.suse.com/security/cve/CVE-2014-9295" }, { "category": "external", "summary": "SUSE Bug 910764 for CVE-2014-9295", "url": "https://bugzilla.suse.com/910764" }, { "category": "external", "summary": "SUSE Bug 911053 for CVE-2014-9295", "url": "https://bugzilla.suse.com/911053" }, { "category": "external", "summary": "SUSE Bug 911792 for CVE-2014-9295", "url": "https://bugzilla.suse.com/911792" }, { "category": "external", "summary": "SUSE Bug 916239 for CVE-2014-9295", "url": "https://bugzilla.suse.com/916239" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2014-9295", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-9295" }, { "cve": "CVE-2014-9296", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9296" } ], "notes": [ { "category": "general", "text": "The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended association change via crafted packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9296", "url": "https://www.suse.com/security/cve/CVE-2014-9296" }, { "category": "external", "summary": "SUSE Bug 910764 for CVE-2014-9296", "url": "https://bugzilla.suse.com/910764" }, { "category": "external", "summary": "SUSE Bug 911053 for CVE-2014-9296", "url": "https://bugzilla.suse.com/911053" }, { "category": "external", "summary": "SUSE Bug 911792 for CVE-2014-9296", "url": "https://bugzilla.suse.com/911792" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2014-9296", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2014-9296", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-9296" }, { "cve": "CVE-2014-9297", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9297" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9750, CVE-2014-9751. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9297", "url": "https://www.suse.com/security/cve/CVE-2014-9297" }, { "category": "external", "summary": "SUSE Bug 911792 for CVE-2014-9297", "url": "https://bugzilla.suse.com/911792" }, { "category": "external", "summary": "SUSE Bug 948963 for CVE-2014-9297", "url": "https://bugzilla.suse.com/948963" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2014-9297", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-9297" }, { "cve": "CVE-2014-9298", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9298" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9750, CVE-2014-9751. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9298", "url": "https://www.suse.com/security/cve/CVE-2014-9298" }, { "category": "external", "summary": "SUSE Bug 911792 for CVE-2014-9298", "url": "https://bugzilla.suse.com/911792" }, { "category": "external", "summary": "SUSE Bug 948963 for CVE-2014-9298", "url": "https://bugzilla.suse.com/948963" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2014-9298", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-9298" }, { "cve": "CVE-2015-1798", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1798" } ], "notes": [ { "category": "general", "text": "The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p2 requires a correct MAC only if the MAC field has a nonzero length, which makes it easier for man-in-the-middle attackers to spoof packets by omitting the MAC.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1798", "url": "https://www.suse.com/security/cve/CVE-2015-1798" }, { "category": "external", "summary": "SUSE Bug 924202 for CVE-2015-1798", "url": "https://bugzilla.suse.com/924202" }, { "category": "external", "summary": "SUSE Bug 927497 for CVE-2015-1798", "url": "https://bugzilla.suse.com/927497" }, { "category": "external", "summary": "SUSE Bug 928321 for CVE-2015-1798", "url": "https://bugzilla.suse.com/928321" }, { "category": "external", "summary": "SUSE Bug 936327 for CVE-2015-1798", "url": "https://bugzilla.suse.com/936327" }, { "category": "external", "summary": "SUSE Bug 957163 for CVE-2015-1798", "url": "https://bugzilla.suse.com/957163" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1798" }, { "cve": "CVE-2015-1799", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1799" } ], "notes": [ { "category": "general", "text": "The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1799", "url": "https://www.suse.com/security/cve/CVE-2015-1799" }, { "category": "external", "summary": "SUSE Bug 924202 for CVE-2015-1799", "url": "https://bugzilla.suse.com/924202" }, { "category": "external", "summary": "SUSE Bug 927497 for CVE-2015-1799", "url": "https://bugzilla.suse.com/927497" }, { "category": "external", "summary": "SUSE Bug 928321 for CVE-2015-1799", "url": "https://bugzilla.suse.com/928321" }, { "category": "external", "summary": "SUSE Bug 936327 for CVE-2015-1799", "url": "https://bugzilla.suse.com/936327" }, { "category": "external", "summary": "SUSE Bug 943565 for CVE-2015-1799", "url": "https://bugzilla.suse.com/943565" }, { "category": "external", "summary": "SUSE Bug 957163 for CVE-2015-1799", "url": "https://bugzilla.suse.com/957163" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-1799", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962624 for CVE-2015-1799", "url": "https://bugzilla.suse.com/962624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-1799" }, { "cve": "CVE-2015-5300", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5300" } ], "notes": [ { "category": "general", "text": "The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5300", "url": "https://www.suse.com/security/cve/CVE-2015-5300" }, { "category": "external", "summary": "SUSE Bug 951629 for CVE-2015-5300", "url": "https://bugzilla.suse.com/951629" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-5300", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962624 for CVE-2015-5300", "url": "https://bugzilla.suse.com/962624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-5300" }, { "cve": "CVE-2015-7691", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7691" } ], "notes": [ { "category": "general", "text": "The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted packets containing particular autokey operations. NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7691", "url": "https://www.suse.com/security/cve/CVE-2015-7691" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7691", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 911792 for CVE-2015-7691", "url": "https://bugzilla.suse.com/911792" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7691", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7691", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7691", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-7691" }, { "cve": "CVE-2015-7692", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7692" } ], "notes": [ { "category": "general", "text": "The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash). NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7692", "url": "https://www.suse.com/security/cve/CVE-2015-7692" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7692", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 911792 for CVE-2015-7692", "url": "https://bugzilla.suse.com/911792" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7692", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7692", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7692", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-7692" }, { "cve": "CVE-2015-7701", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7701" } ], "notes": [ { "category": "general", "text": "Memory leak in the CRYPTO_ASSOC function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (memory consumption).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7701", "url": "https://www.suse.com/security/cve/CVE-2015-7701" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7701", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7701", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7701", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7701", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-7701" }, { "cve": "CVE-2015-7702", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7702" } ], "notes": [ { "category": "general", "text": "The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash). NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7702", "url": "https://www.suse.com/security/cve/CVE-2015-7702" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7702", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 911792 for CVE-2015-7702", "url": "https://bugzilla.suse.com/911792" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7702", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7702", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7702", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-7702" }, { "cve": "CVE-2015-7703", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7703" } ], "notes": [ { "category": "general", "text": "The \"pidfile\" or \"driftfile\" directives in NTP ntpd 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77, when ntpd is configured to allow remote configuration, allows remote attackers with an IP address that is allowed to send configuration requests, and with knowledge of the remote configuration password to write to arbitrary files via the :config command.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7703", "url": "https://www.suse.com/security/cve/CVE-2015-7703" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7703", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 943216 for CVE-2015-7703", "url": "https://bugzilla.suse.com/943216" }, { "category": "external", "summary": "SUSE Bug 943218 for CVE-2015-7703", "url": "https://bugzilla.suse.com/943218" }, { "category": "external", "summary": "SUSE Bug 943219 for CVE-2015-7703", "url": "https://bugzilla.suse.com/943219" }, { "category": "external", "summary": "SUSE Bug 943221 for CVE-2015-7703", "url": "https://bugzilla.suse.com/943221" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7703", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7703", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-7703" }, { "cve": "CVE-2015-7704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7704" } ], "notes": [ { "category": "general", "text": "The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted \"KOD\" messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7704", "url": "https://www.suse.com/security/cve/CVE-2015-7704" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7704", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7704", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 952611 for CVE-2015-7704", "url": "https://bugzilla.suse.com/952611" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7704", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2015-7704", "url": "https://bugzilla.suse.com/977446" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-7704" }, { "cve": "CVE-2015-7705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7705" } ], "notes": [ { "category": "general", "text": "The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7705", "url": "https://www.suse.com/security/cve/CVE-2015-7705" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7705", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7705", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 952611 for CVE-2015-7705", "url": "https://bugzilla.suse.com/952611" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7705", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2015-7705" }, { "cve": "CVE-2015-7848", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7848" } ], "notes": [ { "category": "general", "text": "An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP daemon, it leads to an immediate crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7848", "url": "https://www.suse.com/security/cve/CVE-2015-7848" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7848", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7848", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7848", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7848", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-7848" }, { "cve": "CVE-2015-7849", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7849" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to possibly execute arbitrary code or cause a denial of service (crash) via crafted packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7849", "url": "https://www.suse.com/security/cve/CVE-2015-7849" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7849", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7849", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7849", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7849", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-7849" }, { "cve": "CVE-2015-7850", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7850" } ], "notes": [ { "category": "general", "text": "ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (infinite loop or crash) by pointing the key file at the log file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7850", "url": "https://www.suse.com/security/cve/CVE-2015-7850" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7850", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7850", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7850", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7850", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7850" }, { "cve": "CVE-2015-7851", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7851" } ], "notes": [ { "category": "general", "text": "Directory traversal vulnerability in the save_config function in ntpd in ntp_control.c in NTP before 4.2.8p4, when used on systems that do not use \u0027\\\u0027 or \u0027/\u0027 characters for directory separation such as OpenVMS, allows remote authenticated users to overwrite arbitrary files.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7851", "url": "https://www.suse.com/security/cve/CVE-2015-7851" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7851", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7851", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7851", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7851" }, { "cve": "CVE-2015-7852", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7852" } ], "notes": [ { "category": "general", "text": "ntpq in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted mode 6 response packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7852", "url": "https://www.suse.com/security/cve/CVE-2015-7852" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7852", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7852", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7852", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7852", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7852" }, { "cve": "CVE-2015-7853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7853" } ], "notes": [ { "category": "general", "text": "The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7853", "url": "https://www.suse.com/security/cve/CVE-2015-7853" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7853", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7853", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7853", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7853", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2015-7853" }, { "cve": "CVE-2015-7854", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7854" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the password management functionality in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7854", "url": "https://www.suse.com/security/cve/CVE-2015-7854" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7854", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7854", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7854", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7854", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-7854" }, { "cve": "CVE-2015-7855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7855" } ], "notes": [ { "category": "general", "text": "The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (assertion failure) via a 6 or mode 7 packet containing a long data value.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7855", "url": "https://www.suse.com/security/cve/CVE-2015-7855" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7855", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7855", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7855", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7855", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7855" }, { "cve": "CVE-2015-7871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7871" } ], "notes": [ { "category": "general", "text": "Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7871", "url": "https://www.suse.com/security/cve/CVE-2015-7871" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7871", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7871", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 952606 for CVE-2015-7871", "url": "https://bugzilla.suse.com/952606" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7871", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2015-7871" }, { "cve": "CVE-2015-7973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7973" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90, when configured in broadcast mode, allows man-in-the-middle attackers to conduct replay attacks by sniffing the network.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7973", "url": "https://www.suse.com/security/cve/CVE-2015-7973" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7973", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7973", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7973" }, { "cve": "CVE-2015-7974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7974" } ], "notes": [ { "category": "general", "text": "NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a \"skeleton key.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7974", "url": "https://www.suse.com/security/cve/CVE-2015-7974" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7974", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962960 for CVE-2015-7974", "url": "https://bugzilla.suse.com/962960" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7974", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-7974" }, { "cve": "CVE-2015-7975", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7975" } ], "notes": [ { "category": "general", "text": "The nextvar function in NTP before 4.2.8p6 and 4.3.x before 4.3.90 does not properly validate the length of its input, which allows an attacker to cause a denial of service (application crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7975", "url": "https://www.suse.com/security/cve/CVE-2015-7975" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7975", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962988 for CVE-2015-7975", "url": "https://bugzilla.suse.com/962988" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7975", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-7975" }, { "cve": "CVE-2015-7976", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7976" } ], "notes": [ { "category": "general", "text": "The ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows attackers to cause unspecified impact via a crafted filename.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7976", "url": "https://www.suse.com/security/cve/CVE-2015-7976" }, { "category": "external", "summary": "SUSE Bug 962802 for CVE-2015-7976", "url": "https://bugzilla.suse.com/962802" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7976", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-7976" }, { "cve": "CVE-2015-7977", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7977" } ], "notes": [ { "category": "general", "text": "ntpd in NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (NULL pointer dereference) via a ntpdc reslist command.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7977", "url": "https://www.suse.com/security/cve/CVE-2015-7977" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7977", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962970 for CVE-2015-7977", "url": "https://bugzilla.suse.com/962970" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7977", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7977" }, { "cve": "CVE-2015-7978", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7978" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p6 and 4.3.0 before 4.3.90 allows a remote attackers to cause a denial of service (stack exhaustion) via an ntpdc relist command, which triggers recursive traversal of the restriction list.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7978", "url": "https://www.suse.com/security/cve/CVE-2015-7978" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7978", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962970 for CVE-2015-7978", "url": "https://bugzilla.suse.com/962970" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7978", "url": "https://bugzilla.suse.com/962995" }, { "category": "external", "summary": "SUSE Bug 963000 for CVE-2015-7978", "url": "https://bugzilla.suse.com/963000" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7978" }, { "cve": "CVE-2015-7979", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7979" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (client-server association tear down) by sending broadcast packets with invalid authentication to a broadcast client.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7979", "url": "https://www.suse.com/security/cve/CVE-2015-7979" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7979", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962784 for CVE-2015-7979", "url": "https://bugzilla.suse.com/962784" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7979", "url": "https://bugzilla.suse.com/962995" }, { "category": "external", "summary": "SUSE Bug 977459 for CVE-2015-7979", "url": "https://bugzilla.suse.com/977459" }, { "category": "external", "summary": "SUSE Bug 982065 for CVE-2015-7979", "url": "https://bugzilla.suse.com/982065" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-7979" }, { "cve": "CVE-2015-8138", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8138" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8138", "url": "https://www.suse.com/security/cve/CVE-2015-8138" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-8138", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-8138", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 963002 for CVE-2015-8138", "url": "https://bugzilla.suse.com/963002" }, { "category": "external", "summary": "SUSE Bug 974668 for CVE-2015-8138", "url": "https://bugzilla.suse.com/974668" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2015-8138", "url": "https://bugzilla.suse.com/977446" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-8138" }, { "cve": "CVE-2015-8158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8158" } ], "notes": [ { "category": "general", "text": "The getresponse function in ntpq in NTP versions before 4.2.8p9 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (infinite loop) via crafted packets with incorrect values.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8158", "url": "https://www.suse.com/security/cve/CVE-2015-8158" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-8158", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962966 for CVE-2015-8158", "url": "https://bugzilla.suse.com/962966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-8158" }, { "cve": "CVE-2016-1547", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1547" } ], "notes": [ { "category": "general", "text": "An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1547", "url": "https://www.suse.com/security/cve/CVE-2016-1547" }, { "category": "external", "summary": "SUSE Bug 962784 for CVE-2016-1547", "url": "https://bugzilla.suse.com/962784" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1547", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977459 for CVE-2016-1547", "url": "https://bugzilla.suse.com/977459" }, { "category": "external", "summary": "SUSE Bug 982064 for CVE-2016-1547", "url": "https://bugzilla.suse.com/982064" }, { "category": "external", "summary": "SUSE Bug 982065 for CVE-2016-1547", "url": "https://bugzilla.suse.com/982065" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-1547" }, { "cve": "CVE-2016-1548", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1548" } ], "notes": [ { "category": "general", "text": "An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-\u003edst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1548", "url": "https://www.suse.com/security/cve/CVE-2016-1548" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2016-1548", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1548", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977461 for CVE-2016-1548", "url": "https://bugzilla.suse.com/977461" }, { "category": "external", "summary": "SUSE Bug 982068 for CVE-2016-1548", "url": "https://bugzilla.suse.com/982068" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-1548" }, { "cve": "CVE-2016-1549", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1549" } ], "notes": [ { "category": "general", "text": "A malicious authenticated peer can create arbitrarily-many ephemeral associations in order to win the clock selection algorithm in ntpd in NTP 4.2.8p4 and earlier and NTPsec 3e160db8dc248a0bcb053b56a80167dc742d2b74 and a5fb34b9cc89b92a8fef2f459004865c93bb7f92 and modify a victim\u0027s clock.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1549", "url": "https://www.suse.com/security/cve/CVE-2016-1549" }, { "category": "external", "summary": "SUSE Bug 1083424 for CVE-2016-1549", "url": "https://bugzilla.suse.com/1083424" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1549", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977451 for CVE-2016-1549", "url": "https://bugzilla.suse.com/977451" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-1549" }, { "cve": "CVE-2016-1550", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1550" } ], "notes": [ { "category": "general", "text": "An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest key.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1550", "url": "https://www.suse.com/security/cve/CVE-2016-1550" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1550", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977464 for CVE-2016-1550", "url": "https://bugzilla.suse.com/977464" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-1550" }, { "cve": "CVE-2016-1551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1551" } ], "notes": [ { "category": "general", "text": "ntpd in NTP 4.2.8p3 and NTPsec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 relies on the underlying operating system to protect it from requests that impersonate reference clocks. Because reference clocks are treated like other peers and stored in the same structure, any packet with a source ip address of a reference clock (127.127.1.1 for example) that reaches the receive() function will match that reference clock\u0027s peer record and will be treated as a trusted peer. Any system that lacks the typical martian packet filtering which would block these packets is in danger of having its time controlled by an attacker.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1551", "url": "https://www.suse.com/security/cve/CVE-2016-1551" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-1551", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977450 for CVE-2016-1551", "url": "https://bugzilla.suse.com/977450" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-1551" }, { "cve": "CVE-2016-2516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2516" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p7 and 4.3.x before 4.3.92, when mode7 is enabled, allows remote attackers to cause a denial of service (ntpd abort) by using the same IP address multiple times in an unconfig directive.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2516", "url": "https://www.suse.com/security/cve/CVE-2016-2516" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-2516", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977452 for CVE-2016-2516", "url": "https://bugzilla.suse.com/977452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-2516" }, { "cve": "CVE-2016-2517", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2517" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (prevent subsequent authentication) by leveraging knowledge of the controlkey or requestkey and sending a crafted packet to ntpd, which changes the value of trustedkey, controlkey, or requestkey. NOTE: this vulnerability exists because of a CVE-2016-2516 regression.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2517", "url": "https://www.suse.com/security/cve/CVE-2016-2517" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-2517", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977455 for CVE-2016-2517", "url": "https://bugzilla.suse.com/977455" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-2517" }, { "cve": "CVE-2016-2518", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2518" } ], "notes": [ { "category": "general", "text": "The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2518", "url": "https://www.suse.com/security/cve/CVE-2016-2518" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-2518", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977457 for CVE-2016-2518", "url": "https://bugzilla.suse.com/977457" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-2518" }, { "cve": "CVE-2016-2519", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2519" } ], "notes": [ { "category": "general", "text": "ntpd in NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (ntpd abort) by a large request data value, which triggers the ctl_getitem function to return a NULL value.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2519", "url": "https://www.suse.com/security/cve/CVE-2016-2519" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2016-2519", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2016-2519", "url": "https://bugzilla.suse.com/977446" }, { "category": "external", "summary": "SUSE Bug 977458 for CVE-2016-2519", "url": "https://bugzilla.suse.com/977458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-2519" }, { "cve": "CVE-2016-4953", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4953" } ], "notes": [ { "category": "general", "text": "ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (ephemeral-association demobilization) by sending a spoofed crypto-NAK packet with incorrect authentication data at a certain time.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4953", "url": "https://www.suse.com/security/cve/CVE-2016-4953" }, { "category": "external", "summary": "SUSE Bug 962784 for CVE-2016-4953", "url": "https://bugzilla.suse.com/962784" }, { "category": "external", "summary": "SUSE Bug 977459 for CVE-2016-4953", "url": "https://bugzilla.suse.com/977459" }, { "category": "external", "summary": "SUSE Bug 982056 for CVE-2016-4953", "url": "https://bugzilla.suse.com/982056" }, { "category": "external", "summary": "SUSE Bug 982065 for CVE-2016-4953", "url": "https://bugzilla.suse.com/982065" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-4953" }, { "cve": "CVE-2016-4954", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4954" } ], "notes": [ { "category": "general", "text": "The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4954", "url": "https://www.suse.com/security/cve/CVE-2016-4954" }, { "category": "external", "summary": "SUSE Bug 982056 for CVE-2016-4954", "url": "https://bugzilla.suse.com/982056" }, { "category": "external", "summary": "SUSE Bug 982066 for CVE-2016-4954", "url": "https://bugzilla.suse.com/982066" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-4954" }, { "cve": "CVE-2016-4955", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4955" } ], "notes": [ { "category": "general", "text": "ntpd in NTP 4.x before 4.2.8p8, when autokey is enabled, allows remote attackers to cause a denial of service (peer-variable clearing and association outage) by sending (1) a spoofed crypto-NAK packet or (2) a packet with an incorrect MAC value at a certain time.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4955", "url": "https://www.suse.com/security/cve/CVE-2016-4955" }, { "category": "external", "summary": "SUSE Bug 982056 for CVE-2016-4955", "url": "https://bugzilla.suse.com/982056" }, { "category": "external", "summary": "SUSE Bug 982067 for CVE-2016-4955", "url": "https://bugzilla.suse.com/982067" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-4955" }, { "cve": "CVE-2016-4956", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4956" } ], "notes": [ { "category": "general", "text": "ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (interleaved-mode transition and time change) via a spoofed broadcast packet. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-1548.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4956", "url": "https://www.suse.com/security/cve/CVE-2016-4956" }, { "category": "external", "summary": "SUSE Bug 977461 for CVE-2016-4956", "url": "https://bugzilla.suse.com/977461" }, { "category": "external", "summary": "SUSE Bug 982056 for CVE-2016-4956", "url": "https://bugzilla.suse.com/982056" }, { "category": "external", "summary": "SUSE Bug 982068 for CVE-2016-4956", "url": "https://bugzilla.suse.com/982068" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-4956" }, { "cve": "CVE-2016-4957", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4957" } ], "notes": [ { "category": "general", "text": "ntpd in NTP before 4.2.8p8 allows remote attackers to cause a denial of service (daemon crash) via a crypto-NAK packet. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-1547.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4957", "url": "https://www.suse.com/security/cve/CVE-2016-4957" }, { "category": "external", "summary": "SUSE Bug 977459 for CVE-2016-4957", "url": "https://bugzilla.suse.com/977459" }, { "category": "external", "summary": "SUSE Bug 982056 for CVE-2016-4957", "url": "https://bugzilla.suse.com/982056" }, { "category": "external", "summary": "SUSE Bug 982064 for CVE-2016-4957", "url": "https://bugzilla.suse.com/982064" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4957" }, { "cve": "CVE-2016-7426", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7426" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p9 rate limits responses received from the configured sources when rate limiting for all associations is enabled, which allows remote attackers to cause a denial of service (prevent responses from the sources) by sending responses with a spoofed source address.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7426", "url": "https://www.suse.com/security/cve/CVE-2016-7426" }, { "category": "external", "summary": "SUSE Bug 1011406 for CVE-2016-7426", "url": "https://bugzilla.suse.com/1011406" }, { "category": "external", "summary": "SUSE Bug 1011421 for CVE-2016-7426", "url": "https://bugzilla.suse.com/1011421" }, { "category": "external", "summary": "SUSE Bug 1012330 for CVE-2016-7426", "url": "https://bugzilla.suse.com/1012330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-7426" }, { "cve": "CVE-2016-7427", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7427" } ], "notes": [ { "category": "general", "text": "The broadcast mode replay prevention functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (reject broadcast mode packets) via a crafted broadcast mode packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7427", "url": "https://www.suse.com/security/cve/CVE-2016-7427" }, { "category": "external", "summary": "SUSE Bug 1011390 for CVE-2016-7427", "url": "https://bugzilla.suse.com/1011390" }, { "category": "external", "summary": "SUSE Bug 1011421 for CVE-2016-7427", "url": "https://bugzilla.suse.com/1011421" }, { "category": "external", "summary": "SUSE Bug 1012330 for CVE-2016-7427", "url": "https://bugzilla.suse.com/1012330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-7427" }, { "cve": "CVE-2016-7428", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7428" } ], "notes": [ { "category": "general", "text": "ntpd in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (reject broadcast mode packets) via the poll interval in a broadcast packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7428", "url": "https://www.suse.com/security/cve/CVE-2016-7428" }, { "category": "external", "summary": "SUSE Bug 1011417 for CVE-2016-7428", "url": "https://bugzilla.suse.com/1011417" }, { "category": "external", "summary": "SUSE Bug 1011421 for CVE-2016-7428", "url": "https://bugzilla.suse.com/1011421" }, { "category": "external", "summary": "SUSE Bug 1012330 for CVE-2016-7428", "url": "https://bugzilla.suse.com/1012330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-7428" }, { "cve": "CVE-2016-7429", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7429" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p9 changes the peer structure to the interface it receives the response from a source, which allows remote attackers to cause a denial of service (prevent communication with a source) by sending a response for a source to an interface the source does not use.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7429", "url": "https://www.suse.com/security/cve/CVE-2016-7429" }, { "category": "external", "summary": "SUSE Bug 1011404 for CVE-2016-7429", "url": "https://bugzilla.suse.com/1011404" }, { "category": "external", "summary": "SUSE Bug 1011421 for CVE-2016-7429", "url": "https://bugzilla.suse.com/1011421" }, { "category": "external", "summary": "SUSE Bug 1012330 for CVE-2016-7429", "url": "https://bugzilla.suse.com/1012330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-7429" }, { "cve": "CVE-2016-7431", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7431" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p9 allows remote attackers to bypass the origin timestamp protection mechanism via an origin timestamp of zero. NOTE: this vulnerability exists because of a CVE-2015-8138 regression.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7431", "url": "https://www.suse.com/security/cve/CVE-2016-7431" }, { "category": "external", "summary": "SUSE Bug 1011395 for CVE-2016-7431", "url": "https://bugzilla.suse.com/1011395" }, { "category": "external", "summary": "SUSE Bug 1011421 for CVE-2016-7431", "url": "https://bugzilla.suse.com/1011421" }, { "category": "external", "summary": "SUSE Bug 1012330 for CVE-2016-7431", "url": "https://bugzilla.suse.com/1012330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-7431" }, { "cve": "CVE-2016-7433", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7433" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p9 does not properly perform the initial sync calculations, which allows remote attackers to unspecified impact via unknown vectors, related to a \"root distance that did not include the peer dispersion.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7433", "url": "https://www.suse.com/security/cve/CVE-2016-7433" }, { "category": "external", "summary": "SUSE Bug 1011411 for CVE-2016-7433", "url": "https://bugzilla.suse.com/1011411" }, { "category": "external", "summary": "SUSE Bug 1011421 for CVE-2016-7433", "url": "https://bugzilla.suse.com/1011421" }, { "category": "external", "summary": "SUSE Bug 1012330 for CVE-2016-7433", "url": "https://bugzilla.suse.com/1012330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-7433" }, { "cve": "CVE-2016-7434", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7434" } ], "notes": [ { "category": "general", "text": "The read_mru_list function in NTP before 4.2.8p9 allows remote attackers to cause a denial of service (crash) via a crafted mrulist query.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7434", "url": "https://www.suse.com/security/cve/CVE-2016-7434" }, { "category": "external", "summary": "SUSE Bug 1011398 for CVE-2016-7434", "url": "https://bugzilla.suse.com/1011398" }, { "category": "external", "summary": "SUSE Bug 1011421 for CVE-2016-7434", "url": "https://bugzilla.suse.com/1011421" }, { "category": "external", "summary": "SUSE Bug 1012330 for CVE-2016-7434", "url": "https://bugzilla.suse.com/1012330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-7434" }, { "cve": "CVE-2016-9310", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9310" } ], "notes": [ { "category": "general", "text": "The control mode (mode 6) functionality in ntpd in NTP before 4.2.8p9 allows remote attackers to set or unset traps via a crafted control mode packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9310", "url": "https://www.suse.com/security/cve/CVE-2016-9310" }, { "category": "external", "summary": "SUSE Bug 1011377 for CVE-2016-9310", "url": "https://bugzilla.suse.com/1011377" }, { "category": "external", "summary": "SUSE Bug 1011421 for CVE-2016-9310", "url": "https://bugzilla.suse.com/1011421" }, { "category": "external", "summary": "SUSE Bug 1012330 for CVE-2016-9310", "url": "https://bugzilla.suse.com/1012330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9310" }, { "cve": "CVE-2016-9311", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9311" } ], "notes": [ { "category": "general", "text": "ntpd in NTP before 4.2.8p9, when the trap service is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9311", "url": "https://www.suse.com/security/cve/CVE-2016-9311" }, { "category": "external", "summary": "SUSE Bug 1011377 for CVE-2016-9311", "url": "https://bugzilla.suse.com/1011377" }, { "category": "external", "summary": "SUSE Bug 1011421 for CVE-2016-9311", "url": "https://bugzilla.suse.com/1011421" }, { "category": "external", "summary": "SUSE Bug 1012330 for CVE-2016-9311", "url": "https://bugzilla.suse.com/1012330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-4.2.8p9-1.1.x86_64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.aarch64", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.ppc64le", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.s390x", "openSUSE Tumbleweed:ntp-doc-4.2.8p9-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-9311" } ] }
ICSA-21-103-11
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting these vulnerabilities to CISA." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "TIM 4R-IE devices contain multiple vulnerabilities in the integrated NTP component as listed below.\n\nSiemens recommends specific countermeasures for products where fixes are not, or not yet available.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This ICSA is a verbatim republication of Siemens ProductCERT SSA-497656 from a direct conversion of their vendor\u0027s Common Security Advisory Framework (CSAF) advisory. This is republished to CISA\u0027s website as a means of increasing visibility and is provided \"as-is\" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory. Further, CISA does not endorse any commercial product or service. Please contact Siemens ProductCERT directly for any questions regarding this advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Critical Manufacturing", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "other", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-497656: Multiple NTP Vulnerabilities in TIM 4R-IE Devices - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-497656.json" }, { "category": "self", "summary": "SSA-497656: Multiple NTP Vulnerabilities in TIM 4R-IE Devices - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-497656.html" }, { "category": "self", "summary": "ICS Advisory ICSA-21-103-11 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-103-11.json" }, { "category": "self", "summary": "ICS Advisory ICSA-21-103-11 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-103-11" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens TIM 4R-IE Devices", "tracking": { "current_release_date": "2025-06-10T00:00:00.000000Z", "generator": { "date": "2025-06-12T16:06:28.183821Z", "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-21-103-11", "initial_release_date": "2021-04-13T00:00:00.000000Z", "revision_history": [ { "date": "2021-04-13T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2025-06-10T00:00:00.000000Z", "legacy_version": "1.1", "number": "2", "summary": "Expanded affected TIM 4R-IE product families to individual products, incl. MLFB IDs; CVE-2015-5219: changed CWE from CWE-704 to CWE-681; CVE-2015-7973: changed CWE from CWE-254 to CWE-294; CVE-2015-7979: changed CWE from CWE-19 to CWE-821; CVE-2016-1547: changed CWE from CWE-20 to CWE-821; CVE-2016-1548: changed CWE from CWE-19 to CWE-290" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS NET TIM 4R-IE (6AG1800-4BA00-7AA0)", "product_id": "CSAFPID-0001", "product_identification_helper": { "model_numbers": [ "6AG1800-4BA00-7AA0" ] } } } ], "category": "product_name", "name": "SIPLUS NET TIM 4R-IE (6AG1800-4BA00-7AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS NET TIM 4R-IE DNP3 (6AG1803-4BA00-7AA0)", "product_id": "CSAFPID-0002", "product_identification_helper": { "model_numbers": [ "6AG1803-4BA00-7AA0" ] } } } ], "category": "product_name", "name": "SIPLUS NET TIM 4R-IE DNP3 (6AG1803-4BA00-7AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "TIM 4R-IE (6NH7800-4BA00)", "product_id": "CSAFPID-0003", "product_identification_helper": { "model_numbers": [ "6NH7800-4BA00" ] } } } ], "category": "product_name", "name": "TIM 4R-IE (6NH7800-4BA00)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "TIM 4R-IE DNP3 (6NH7803-4BA00-0AA0)", "product_id": "CSAFPID-0004", "product_identification_helper": { "model_numbers": [ "6NH7803-4BA00-0AA0" ] } } } ], "category": "product_name", "name": "TIM 4R-IE DNP3 (6NH7803-4BA00-0AA0)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-5219", "cwe": { "id": "CWE-681", "name": "Incorrect Conversion between Numeric Types" }, "notes": [ { "category": "summary", "text": "The ULOGTOD function in ntp.d in SNTP before 4.2.7p366 does not properly perform type conversions from a precision value to a double, which allows remote attackers to cause a denial of service (infinite loop) via a crafted NTP packet.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2015-5219" }, { "cve": "CVE-2015-7705", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2015-7705" }, { "cve": "CVE-2015-7855", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (assertion failure) via a 6 or mode 7 packet containing a long data value.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2015-7855" }, { "cve": "CVE-2015-7871", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2015-7871" }, { "cve": "CVE-2015-7973", "cwe": { "id": "CWE-294", "name": "Authentication Bypass by Capture-replay" }, "notes": [ { "category": "summary", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90, when configured in broadcast mode, allows man-in-the-middle attackers to conduct replay attacks by sniffing the network.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2015-7973" }, { "cve": "CVE-2015-7974", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a \"skeleton key.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2015-7974" }, { "cve": "CVE-2015-7977", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ntpd in NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (NULL pointer dereference) via a ntpdc reslist command.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2015-7977" }, { "cve": "CVE-2015-7979", "cwe": { "id": "CWE-821", "name": "Incorrect Synchronization" }, "notes": [ { "category": "summary", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (client-server association tear down) by sending broadcast packets with invalid authentication to a broadcast client.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2015-7979" }, { "cve": "CVE-2015-8138", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2015-8138" }, { "cve": "CVE-2016-1547", "cwe": { "id": "CWE-821", "name": "Incorrect Synchronization" }, "notes": [ { "category": "summary", "text": "An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2016-1547" }, { "cve": "CVE-2016-1548", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "notes": [ { "category": "summary", "text": "An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-\u003edst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2016-1548" }, { "cve": "CVE-2016-1550", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest key.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2016-1550" }, { "cve": "CVE-2016-4953", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (ephemeral-association demobilization) by sending a spoofed crypto-NAK packet with incorrect authentication data at a certain time.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2016-4953" }, { "cve": "CVE-2016-4954", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2016-4954" } ] }
icsa-21-103-11
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting these vulnerabilities to CISA." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "TIM 4R-IE devices contain multiple vulnerabilities in the integrated NTP component as listed below.\n\nSiemens recommends specific countermeasures for products where fixes are not, or not yet available.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "The use of Siemens Security Advisories is subject to the terms and conditions listed on: https://www.siemens.com/productcert/terms-of-use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This ICSA is a verbatim republication of Siemens ProductCERT SSA-497656 from a direct conversion of their vendor\u0027s Common Security Advisory Framework (CSAF) advisory. This is republished to CISA\u0027s website as a means of increasing visibility and is provided \"as-is\" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory. Further, CISA does not endorse any commercial product or service. Please contact Siemens ProductCERT directly for any questions regarding this advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Critical Manufacturing", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "other", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-497656: Multiple NTP Vulnerabilities in TIM 4R-IE Devices - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-497656.json" }, { "category": "self", "summary": "SSA-497656: Multiple NTP Vulnerabilities in TIM 4R-IE Devices - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-497656.html" }, { "category": "self", "summary": "ICS Advisory ICSA-21-103-11 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-103-11.json" }, { "category": "self", "summary": "ICS Advisory ICSA-21-103-11 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-103-11" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens TIM 4R-IE Devices", "tracking": { "current_release_date": "2025-06-10T00:00:00.000000Z", "generator": { "date": "2025-06-12T16:06:28.183821Z", "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-21-103-11", "initial_release_date": "2021-04-13T00:00:00.000000Z", "revision_history": [ { "date": "2021-04-13T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2025-06-10T00:00:00.000000Z", "legacy_version": "1.1", "number": "2", "summary": "Expanded affected TIM 4R-IE product families to individual products, incl. MLFB IDs; CVE-2015-5219: changed CWE from CWE-704 to CWE-681; CVE-2015-7973: changed CWE from CWE-254 to CWE-294; CVE-2015-7979: changed CWE from CWE-19 to CWE-821; CVE-2016-1547: changed CWE from CWE-20 to CWE-821; CVE-2016-1548: changed CWE from CWE-19 to CWE-290" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS NET TIM 4R-IE (6AG1800-4BA00-7AA0)", "product_id": "CSAFPID-0001", "product_identification_helper": { "model_numbers": [ "6AG1800-4BA00-7AA0" ] } } } ], "category": "product_name", "name": "SIPLUS NET TIM 4R-IE (6AG1800-4BA00-7AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIPLUS NET TIM 4R-IE DNP3 (6AG1803-4BA00-7AA0)", "product_id": "CSAFPID-0002", "product_identification_helper": { "model_numbers": [ "6AG1803-4BA00-7AA0" ] } } } ], "category": "product_name", "name": "SIPLUS NET TIM 4R-IE DNP3 (6AG1803-4BA00-7AA0)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "TIM 4R-IE (6NH7800-4BA00)", "product_id": "CSAFPID-0003", "product_identification_helper": { "model_numbers": [ "6NH7800-4BA00" ] } } } ], "category": "product_name", "name": "TIM 4R-IE (6NH7800-4BA00)" }, { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "TIM 4R-IE DNP3 (6NH7803-4BA00-0AA0)", "product_id": "CSAFPID-0004", "product_identification_helper": { "model_numbers": [ "6NH7803-4BA00-0AA0" ] } } } ], "category": "product_name", "name": "TIM 4R-IE DNP3 (6NH7803-4BA00-0AA0)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-5219", "cwe": { "id": "CWE-681", "name": "Incorrect Conversion between Numeric Types" }, "notes": [ { "category": "summary", "text": "The ULOGTOD function in ntp.d in SNTP before 4.2.7p366 does not properly perform type conversions from a precision value to a double, which allows remote attackers to cause a denial of service (infinite loop) via a crafted NTP packet.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2015-5219" }, { "cve": "CVE-2015-7705", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2015-7705" }, { "cve": "CVE-2015-7855", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (assertion failure) via a 6 or mode 7 packet containing a long data value.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2015-7855" }, { "cve": "CVE-2015-7871", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2015-7871" }, { "cve": "CVE-2015-7973", "cwe": { "id": "CWE-294", "name": "Authentication Bypass by Capture-replay" }, "notes": [ { "category": "summary", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90, when configured in broadcast mode, allows man-in-the-middle attackers to conduct replay attacks by sniffing the network.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2015-7973" }, { "cve": "CVE-2015-7974", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a \"skeleton key.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2015-7974" }, { "cve": "CVE-2015-7977", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "summary", "text": "ntpd in NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (NULL pointer dereference) via a ntpdc reslist command.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2015-7977" }, { "cve": "CVE-2015-7979", "cwe": { "id": "CWE-821", "name": "Incorrect Synchronization" }, "notes": [ { "category": "summary", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (client-server association tear down) by sending broadcast packets with invalid authentication to a broadcast client.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2015-7979" }, { "cve": "CVE-2015-8138", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2015-8138" }, { "cve": "CVE-2016-1547", "cwe": { "id": "CWE-821", "name": "Incorrect Synchronization" }, "notes": [ { "category": "summary", "text": "An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2016-1547" }, { "cve": "CVE-2016-1548", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "notes": [ { "category": "summary", "text": "An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-\u003edst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2016-1548" }, { "cve": "CVE-2016-1550", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest key.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2016-1550" }, { "cve": "CVE-2016-4953", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (ephemeral-association demobilization) by sending a spoofed crypto-NAK packet with incorrect authentication data at a certain time.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2016-4953" }, { "cve": "CVE-2016-4954", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, "remediations": [ { "category": "no_fix_planned", "details": "Currently no fix is planned", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Deactivate NTP-based time syncronization of the device, if enabled. The feature is disabled by default.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] }, { "category": "workaround", "details": "Configure an additional firewall to prevent communication to the port udp/123 of an affected device.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004" ] } ], "title": "CVE-2016-4954" } ] }
ICSA-21-159-11
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting these vulnerabilities to CISA." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "notes": [ { "category": "summary", "text": "All versions of the SIMATIC CP 443-1 OPC UA contain multiple vulnerabilities in the underlying third party component NTP.\n\nSiemens recommends specific countermeasures for products where updates are not, or not yet available.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "other", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-211752: Multiple NTP-Client Related Vulnerabilities in SIMATIC CP 443-1 OPC UA - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-211752.json" }, { "category": "self", "summary": "SSA-211752: Multiple NTP-Client Related Vulnerabilities in SIMATIC CP 443-1 OPC UA - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-211752.txt" }, { "category": "self", "summary": "SSA-211752: Multiple NTP-Client Related Vulnerabilities in SIMATIC CP 443-1 OPC UA - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "category": "self", "summary": "ICS Advisory ICSA-21-159-11 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-159-11.json" }, { "category": "self", "summary": "ICS Advisory ICSA-21-159-11 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-159-11" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens SIMATIC NET CP 443-1 OPC UA", "tracking": { "current_release_date": "2025-05-06T06:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-21-159-11", "initial_release_date": "2021-06-08T00:00:00.000000Z", "revision_history": [ { "date": "2021-06-08T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2022-02-08T00:00:00.000000Z", "legacy_version": "1.1", "number": "2", "summary": "No remediation planned for SIMATIC CP 443-1 OPC UA" }, { "date": "2025-05-06T06:00:00.000000Z", "legacy_version": "Revision", "number": "3", "summary": "Revision - Fixing typos" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 443-1 OPC UA (6GK7443-1UX00-0XE0)", "product_id": "CSAFPID-0001", "product_identification_helper": { "model_numbers": [ "6GK7443-1UX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 443-1 OPC UA" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7705", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2015-7705 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2015-7705.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2015-7705" }, { "cve": "CVE-2015-7853", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2015-7853 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2015-7853.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2015-7853" }, { "cve": "CVE-2015-8138", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2015-8138 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2015-8138.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2015-8138" }, { "cve": "CVE-2016-1547", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-1547 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-1547.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-1547" }, { "cve": "CVE-2016-1548", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "notes": [ { "category": "summary", "text": "An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-\u003edst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-1548 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-1548.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-1548" }, { "cve": "CVE-2016-1550", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest key.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-1550 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-1550.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-1550" }, { "cve": "CVE-2016-2518", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-2518 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-2518.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-2518" }, { "cve": "CVE-2016-4953", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (ephemeral-association demobilization) by sending a spoofed crypto-NAK packet with incorrect authentication data at a certain time.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-4953 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-4953.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-4953" }, { "cve": "CVE-2016-4954", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-4954 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-4954.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-4954" }, { "cve": "CVE-2016-4955", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "ntpd in NTP 4.x before 4.2.8p8, when autokey is enabled, allows remote attackers to cause a denial of service (peer-variable clearing and association outage) by sending (1) a spoofed crypto-NAK packet or (2) a packet with an incorrect MAC value at a certain time.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-4955 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-4955.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-4955" }, { "cve": "CVE-2016-4956", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (interleaved-mode transition and time change) via a spoofed broadcast packet. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-1548.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-4956 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-4956.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-4956" }, { "cve": "CVE-2016-7431", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "NTP before 4.2.8p9 allows remote attackers to bypass the origin timestamp protection mechanism via an origin timestamp of zero. NOTE: this vulnerability exists because of a CVE-2015-8138 regression.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-7431 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-7431.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-7431" }, { "cve": "CVE-2016-7433", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "notes": [ { "category": "summary", "text": "NTP before 4.2.8p9 does not properly perform the initial sync calculations, which allows remote attackers to unspecified impact via unknown vectors, related to a \"root distance that did not include the peer dispersion.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-7433 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-7433.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-7433" }, { "cve": "CVE-2016-9042", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-9042 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-9042.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-9042" }, { "cve": "CVE-2017-6458", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2017-6458 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2017-6458.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2017-6458" } ] }
icsa-21-159-11
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens ProductCERT", "summary": "reporting these vulnerabilities to CISA." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "notes": [ { "category": "summary", "text": "All versions of the SIMATIC CP 443-1 OPC UA contain multiple vulnerabilities in the underlying third party component NTP.\n\nSiemens recommends specific countermeasures for products where updates are not, or not yet available.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "other", "text": "This CISA CSAF advisory was converted from Siemens ProductCERT\u0027s CSAF advisory.", "title": "Advisory Conversion Disclaimer" }, { "category": "other", "text": "Multiple", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.", "title": "Recommended Practices" }, { "category": "general", "text": "Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.", "title": "Recommended Practices" }, { "category": "general", "text": "Locate control system networks and remote devices behind firewalls and isolate them from business networks.", "title": "Recommended Practices" }, { "category": "general", "text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "other", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "SSA-211752: Multiple NTP-Client Related Vulnerabilities in SIMATIC CP 443-1 OPC UA - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-211752.json" }, { "category": "self", "summary": "SSA-211752: Multiple NTP-Client Related Vulnerabilities in SIMATIC CP 443-1 OPC UA - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-211752.txt" }, { "category": "self", "summary": "SSA-211752: Multiple NTP-Client Related Vulnerabilities in SIMATIC CP 443-1 OPC UA - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "category": "self", "summary": "ICS Advisory ICSA-21-159-11 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2021/icsa-21-159-11.json" }, { "category": "self", "summary": "ICS Advisory ICSA-21-159-11 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-21-159-11" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens SIMATIC NET CP 443-1 OPC UA", "tracking": { "current_release_date": "2025-05-06T06:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-21-159-11", "initial_release_date": "2021-06-08T00:00:00.000000Z", "revision_history": [ { "date": "2021-06-08T00:00:00.000000Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" }, { "date": "2022-02-08T00:00:00.000000Z", "legacy_version": "1.1", "number": "2", "summary": "No remediation planned for SIMATIC CP 443-1 OPC UA" }, { "date": "2025-05-06T06:00:00.000000Z", "legacy_version": "Revision", "number": "3", "summary": "Revision - Fixing typos" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:all/*", "product": { "name": "SIMATIC CP 443-1 OPC UA (6GK7443-1UX00-0XE0)", "product_id": "CSAFPID-0001", "product_identification_helper": { "model_numbers": [ "6GK7443-1UX00-0XE0" ] } } } ], "category": "product_name", "name": "SIMATIC CP 443-1 OPC UA" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7705", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2015-7705 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2015-7705.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2015-7705" }, { "cve": "CVE-2015-7853", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2015-7853 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2015-7853.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2015-7853" }, { "cve": "CVE-2015-8138", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2015-8138 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2015-8138.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2015-8138" }, { "cve": "CVE-2016-1547", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-1547 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-1547.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-1547" }, { "cve": "CVE-2016-1548", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "notes": [ { "category": "summary", "text": "An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-\u003edst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-1548 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-1548.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-1548" }, { "cve": "CVE-2016-1550", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest key.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-1550 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-1550.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-1550" }, { "cve": "CVE-2016-2518", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-2518 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-2518.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-2518" }, { "cve": "CVE-2016-4953", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (ephemeral-association demobilization) by sending a spoofed crypto-NAK packet with incorrect authentication data at a certain time.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-4953 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-4953.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-4953" }, { "cve": "CVE-2016-4954", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-4954 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-4954.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-4954" }, { "cve": "CVE-2016-4955", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "ntpd in NTP 4.x before 4.2.8p8, when autokey is enabled, allows remote attackers to cause a denial of service (peer-variable clearing and association outage) by sending (1) a spoofed crypto-NAK packet or (2) a packet with an incorrect MAC value at a certain time.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-4955 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-4955.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-4955" }, { "cve": "CVE-2016-4956", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (interleaved-mode transition and time change) via a spoofed broadcast packet. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-1548.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-4956 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-4956.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-4956" }, { "cve": "CVE-2016-7431", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "NTP before 4.2.8p9 allows remote attackers to bypass the origin timestamp protection mechanism via an origin timestamp of zero. NOTE: this vulnerability exists because of a CVE-2015-8138 regression.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-7431 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-7431.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-7431" }, { "cve": "CVE-2016-7433", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "notes": [ { "category": "summary", "text": "NTP before 4.2.8p9 does not properly perform the initial sync calculations, which allows remote attackers to unspecified impact via unknown vectors, related to a \"root distance that did not include the peer dispersion.\"", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-7433 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-7433.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-7433" }, { "cve": "CVE-2016-9042", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2016-9042 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2016-9042.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2016-9042" }, { "cve": "CVE-2017-6458", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "Multiple buffer overflows in the ctl_put* functions in NTP before 4.2.8p10 and 4.3.x before 4.3.94 allow remote authenticated users to have unspecified impact via a long variable.", "title": "Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "summary": "CVE-2017-6458 Mitre 5.0 json", "url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2017-6458.json" } ], "remediations": [ { "category": "no_fix_planned", "details": "Currently no remediation is planned", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Deactivate NTP-based time synchronization of the device, if enabled. The feature is disabled by default", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "Configure an additional firewall to prevent communication to port udp/123 of an affected device", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "title": "CVE-2017-6458" } ] }
suse-su-2016:1175-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for ntp", "title": "Title of the patch" }, { "category": "description", "text": "ntp was updated to version 4.2.8p6 to fix 12 security issues.\n\nThese security issues were fixed:\n- CVE-2015-8158: Fixed potential infinite loop in ntpq (bsc#962966).\n- CVE-2015-8138: Zero Origin Timestamp Bypass (bsc#963002).\n- CVE-2015-7979: Off-path Denial of Service (DoS) attack on authenticated broadcast mode (bsc#962784).\n- CVE-2015-7978: Stack exhaustion in recursive traversal of restriction list (bsc#963000).\n- CVE-2015-7977: reslist NULL pointer dereference (bsc#962970).\n- CVE-2015-7976: ntpq saveconfig command allows dangerous characters in filenames (bsc#962802).\n- CVE-2015-7975: nextvar() missing length check (bsc#962988).\n- CVE-2015-7974: Skeleton Key: Missing key check allows impersonation between authenticated peers (bsc#962960).\n- CVE-2015-7973: Replay attack on authenticated broadcast mode (bsc#962995).\n- CVE-2015-8140: ntpq vulnerable to replay attacks (bsc#962994).\n- CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin (bsc#962997).\n- CVE-2015-5300: MITM attacker could have forced ntpd to make a step larger than the panic threshold (bsc#951629).\n\nThese non-security issues were fixed:\n- fate#320758 bsc#975981: Enable compile-time support for MS-SNTP\n (--enable-ntp-signd). This replaces the w32 patches in 4.2.4 that added\n the authreg directive.\n- bsc#962318: Call /usr/sbin/sntp with full path to synchronize in start-ntpd.\n When run as cron job, /usr/sbin/ is not in the path, which caused\n the synchronization to fail.\n- bsc#782060: Speedup ntpq.\n- bsc#916617: Add /var/db/ntp-kod.\n- bsc#956773: Add ntp-ENOBUFS.patch to limit a warning that might happen quite a lot on loaded systems.\n- bsc#951559,bsc#975496: Fix the TZ offset output of sntp during DST.\n- Add ntp-fork.patch and build with threads disabled to allow name resolution even when running chrooted.\n- bsc#784760: Remove local clock from default configuration\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp4-ntp-12533", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1175-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1175-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161175-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1175-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-April/002032.html" }, { "category": "self", "summary": "SUSE Bug 782060", "url": "https://bugzilla.suse.com/782060" }, { "category": "self", "summary": "SUSE Bug 784760", "url": "https://bugzilla.suse.com/784760" }, { "category": "self", "summary": "SUSE Bug 916617", "url": "https://bugzilla.suse.com/916617" }, { "category": "self", "summary": "SUSE Bug 951559", "url": "https://bugzilla.suse.com/951559" }, { "category": "self", "summary": "SUSE Bug 951629", "url": "https://bugzilla.suse.com/951629" }, { "category": "self", "summary": "SUSE Bug 956773", "url": "https://bugzilla.suse.com/956773" }, { "category": "self", "summary": "SUSE Bug 962318", "url": "https://bugzilla.suse.com/962318" }, { "category": "self", "summary": "SUSE Bug 962784", "url": "https://bugzilla.suse.com/962784" }, { "category": "self", "summary": "SUSE Bug 962802", "url": "https://bugzilla.suse.com/962802" }, { "category": "self", "summary": "SUSE Bug 962960", "url": "https://bugzilla.suse.com/962960" }, { "category": "self", "summary": "SUSE Bug 962966", "url": "https://bugzilla.suse.com/962966" }, { "category": "self", "summary": "SUSE Bug 962970", "url": "https://bugzilla.suse.com/962970" }, { "category": "self", "summary": "SUSE Bug 962988", "url": "https://bugzilla.suse.com/962988" }, { "category": "self", "summary": "SUSE Bug 962994", "url": "https://bugzilla.suse.com/962994" }, { "category": "self", "summary": "SUSE Bug 962995", "url": "https://bugzilla.suse.com/962995" }, { "category": "self", "summary": "SUSE Bug 962997", "url": "https://bugzilla.suse.com/962997" }, { "category": "self", "summary": "SUSE Bug 963000", "url": "https://bugzilla.suse.com/963000" }, { "category": "self", "summary": "SUSE Bug 963002", "url": "https://bugzilla.suse.com/963002" }, { "category": "self", "summary": "SUSE Bug 975496", "url": "https://bugzilla.suse.com/975496" }, { "category": "self", "summary": "SUSE Bug 975981", "url": "https://bugzilla.suse.com/975981" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5300 page", "url": "https://www.suse.com/security/cve/CVE-2015-5300/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7973 page", "url": "https://www.suse.com/security/cve/CVE-2015-7973/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7974 page", "url": "https://www.suse.com/security/cve/CVE-2015-7974/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7975 page", "url": "https://www.suse.com/security/cve/CVE-2015-7975/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7976 page", "url": "https://www.suse.com/security/cve/CVE-2015-7976/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7977 page", "url": "https://www.suse.com/security/cve/CVE-2015-7977/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7978 page", "url": "https://www.suse.com/security/cve/CVE-2015-7978/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7979 page", "url": "https://www.suse.com/security/cve/CVE-2015-7979/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8138 page", "url": "https://www.suse.com/security/cve/CVE-2015-8138/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8139 page", "url": "https://www.suse.com/security/cve/CVE-2015-8139/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8140 page", "url": "https://www.suse.com/security/cve/CVE-2015-8140/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8158 page", "url": "https://www.suse.com/security/cve/CVE-2015-8158/" } ], "title": "Security update for ntp", "tracking": { "current_release_date": "2016-04-28T13:46:02Z", "generator": { "date": "2016-04-28T13:46:02Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1175-1", "initial_release_date": "2016-04-28T13:46:02Z", "revision_history": [ { "date": "2016-04-28T13:46:02Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p6-8.2.i586", "product": { "name": "ntp-4.2.8p6-8.2.i586", "product_id": "ntp-4.2.8p6-8.2.i586" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p6-8.2.i586", "product": { "name": "ntp-doc-4.2.8p6-8.2.i586", "product_id": "ntp-doc-4.2.8p6-8.2.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p6-8.2.ia64", "product": { "name": "ntp-4.2.8p6-8.2.ia64", "product_id": "ntp-4.2.8p6-8.2.ia64" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p6-8.2.ia64", "product": { "name": "ntp-doc-4.2.8p6-8.2.ia64", "product_id": "ntp-doc-4.2.8p6-8.2.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p6-8.2.ppc64", "product": { "name": "ntp-4.2.8p6-8.2.ppc64", "product_id": "ntp-4.2.8p6-8.2.ppc64" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p6-8.2.ppc64", "product": { "name": "ntp-doc-4.2.8p6-8.2.ppc64", "product_id": "ntp-doc-4.2.8p6-8.2.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p6-8.2.s390x", "product": { "name": "ntp-4.2.8p6-8.2.s390x", "product_id": "ntp-4.2.8p6-8.2.s390x" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p6-8.2.s390x", "product": { "name": "ntp-doc-4.2.8p6-8.2.s390x", "product_id": "ntp-doc-4.2.8p6-8.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p6-8.2.x86_64", "product": { "name": "ntp-4.2.8p6-8.2.x86_64", "product_id": "ntp-4.2.8p6-8.2.x86_64" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p6-8.2.x86_64", "product": { "name": "ntp-doc-4.2.8p6-8.2.x86_64", "product_id": "ntp-doc-4.2.8p6-8.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-8.2.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586" }, "product_reference": "ntp-4.2.8p6-8.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-8.2.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64" }, "product_reference": "ntp-4.2.8p6-8.2.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-8.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64" }, "product_reference": "ntp-4.2.8p6-8.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-8.2.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x" }, "product_reference": "ntp-4.2.8p6-8.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-8.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64" }, "product_reference": "ntp-4.2.8p6-8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-8.2.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586" }, "product_reference": "ntp-doc-4.2.8p6-8.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-8.2.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64" }, "product_reference": "ntp-doc-4.2.8p6-8.2.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-8.2.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64" }, "product_reference": "ntp-doc-4.2.8p6-8.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-8.2.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x" }, "product_reference": "ntp-doc-4.2.8p6-8.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-8.2.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" }, "product_reference": "ntp-doc-4.2.8p6-8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-8.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586" }, "product_reference": "ntp-4.2.8p6-8.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-8.2.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64" }, "product_reference": "ntp-4.2.8p6-8.2.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-8.2.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64" }, "product_reference": "ntp-4.2.8p6-8.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-8.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x" }, "product_reference": "ntp-4.2.8p6-8.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-8.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64" }, "product_reference": "ntp-4.2.8p6-8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-8.2.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586" }, "product_reference": "ntp-doc-4.2.8p6-8.2.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-8.2.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64" }, "product_reference": "ntp-doc-4.2.8p6-8.2.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-8.2.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64" }, "product_reference": "ntp-doc-4.2.8p6-8.2.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-8.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x" }, "product_reference": "ntp-doc-4.2.8p6-8.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-8.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" }, "product_reference": "ntp-doc-4.2.8p6-8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-5300", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5300" } ], "notes": [ { "category": "general", "text": "The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5300", "url": "https://www.suse.com/security/cve/CVE-2015-5300" }, { "category": "external", "summary": "SUSE Bug 951629 for CVE-2015-5300", "url": "https://bugzilla.suse.com/951629" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-5300", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962624 for CVE-2015-5300", "url": "https://bugzilla.suse.com/962624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-28T13:46:02Z", "details": "moderate" } ], "title": "CVE-2015-5300" }, { "cve": "CVE-2015-7973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7973" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90, when configured in broadcast mode, allows man-in-the-middle attackers to conduct replay attacks by sniffing the network.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7973", "url": "https://www.suse.com/security/cve/CVE-2015-7973" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7973", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7973", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-28T13:46:02Z", "details": "moderate" } ], "title": "CVE-2015-7973" }, { "cve": "CVE-2015-7974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7974" } ], "notes": [ { "category": "general", "text": "NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a \"skeleton key.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7974", "url": "https://www.suse.com/security/cve/CVE-2015-7974" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7974", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962960 for CVE-2015-7974", "url": "https://bugzilla.suse.com/962960" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7974", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-28T13:46:02Z", "details": "low" } ], "title": "CVE-2015-7974" }, { "cve": "CVE-2015-7975", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7975" } ], "notes": [ { "category": "general", "text": "The nextvar function in NTP before 4.2.8p6 and 4.3.x before 4.3.90 does not properly validate the length of its input, which allows an attacker to cause a denial of service (application crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7975", "url": "https://www.suse.com/security/cve/CVE-2015-7975" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7975", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962988 for CVE-2015-7975", "url": "https://bugzilla.suse.com/962988" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7975", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-28T13:46:02Z", "details": "low" } ], "title": "CVE-2015-7975" }, { "cve": "CVE-2015-7976", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7976" } ], "notes": [ { "category": "general", "text": "The ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows attackers to cause unspecified impact via a crafted filename.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7976", "url": "https://www.suse.com/security/cve/CVE-2015-7976" }, { "category": "external", "summary": "SUSE Bug 962802 for CVE-2015-7976", "url": "https://bugzilla.suse.com/962802" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7976", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-28T13:46:02Z", "details": "low" } ], "title": "CVE-2015-7976" }, { "cve": "CVE-2015-7977", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7977" } ], "notes": [ { "category": "general", "text": "ntpd in NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (NULL pointer dereference) via a ntpdc reslist command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7977", "url": "https://www.suse.com/security/cve/CVE-2015-7977" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7977", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962970 for CVE-2015-7977", "url": "https://bugzilla.suse.com/962970" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7977", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-28T13:46:02Z", "details": "moderate" } ], "title": "CVE-2015-7977" }, { "cve": "CVE-2015-7978", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7978" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p6 and 4.3.0 before 4.3.90 allows a remote attackers to cause a denial of service (stack exhaustion) via an ntpdc relist command, which triggers recursive traversal of the restriction list.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7978", "url": "https://www.suse.com/security/cve/CVE-2015-7978" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7978", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962970 for CVE-2015-7978", "url": "https://bugzilla.suse.com/962970" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7978", "url": "https://bugzilla.suse.com/962995" }, { "category": "external", "summary": "SUSE Bug 963000 for CVE-2015-7978", "url": "https://bugzilla.suse.com/963000" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-28T13:46:02Z", "details": "moderate" } ], "title": "CVE-2015-7978" }, { "cve": "CVE-2015-7979", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7979" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (client-server association tear down) by sending broadcast packets with invalid authentication to a broadcast client.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7979", "url": "https://www.suse.com/security/cve/CVE-2015-7979" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7979", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962784 for CVE-2015-7979", "url": "https://bugzilla.suse.com/962784" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7979", "url": "https://bugzilla.suse.com/962995" }, { "category": "external", "summary": "SUSE Bug 977459 for CVE-2015-7979", "url": "https://bugzilla.suse.com/977459" }, { "category": "external", "summary": "SUSE Bug 982065 for CVE-2015-7979", "url": "https://bugzilla.suse.com/982065" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-28T13:46:02Z", "details": "moderate" } ], "title": "CVE-2015-7979" }, { "cve": "CVE-2015-8138", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8138" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8138", "url": "https://www.suse.com/security/cve/CVE-2015-8138" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-8138", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-8138", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 963002 for CVE-2015-8138", "url": "https://bugzilla.suse.com/963002" }, { "category": "external", "summary": "SUSE Bug 974668 for CVE-2015-8138", "url": "https://bugzilla.suse.com/974668" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2015-8138", "url": "https://bugzilla.suse.com/977446" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-28T13:46:02Z", "details": "moderate" } ], "title": "CVE-2015-8138" }, { "cve": "CVE-2015-8139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8139" } ], "notes": [ { "category": "general", "text": "ntpq in NTP before 4.2.8p7 allows remote attackers to obtain origin timestamps and then impersonate peers via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8139", "url": "https://www.suse.com/security/cve/CVE-2015-8139" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-8139", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-8139", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962997 for CVE-2015-8139", "url": "https://bugzilla.suse.com/962997" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-28T13:46:02Z", "details": "moderate" } ], "title": "CVE-2015-8139" }, { "cve": "CVE-2015-8140", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8140" } ], "notes": [ { "category": "general", "text": "The ntpq protocol in NTP before 4.2.8p7 allows remote attackers to conduct replay attacks by sniffing the network.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8140", "url": "https://www.suse.com/security/cve/CVE-2015-8140" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-8140", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-8140", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962994 for CVE-2015-8140", "url": "https://bugzilla.suse.com/962994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-28T13:46:02Z", "details": "moderate" } ], "title": "CVE-2015-8140" }, { "cve": "CVE-2015-8158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8158" } ], "notes": [ { "category": "general", "text": "The getresponse function in ntpq in NTP versions before 4.2.8p9 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (infinite loop) via crafted packets with incorrect values.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8158", "url": "https://www.suse.com/security/cve/CVE-2015-8158" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-8158", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962966 for CVE-2015-8158", "url": "https://bugzilla.suse.com/962966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:ntp-doc-4.2.8p6-8.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-04-28T13:46:02Z", "details": "low" } ], "title": "CVE-2015-8158" } ] }
suse-su-2016:1247-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for ntp", "title": "Title of the patch" }, { "category": "description", "text": "ntp was updated to version 4.2.8p6 to fix 28 security issues.\n\nMajor functional changes:\n- The \u0027sntp\u0027 commandline tool changed its option handling in a major way,\n some options have been renamed or dropped.\n- \u0027controlkey 1\u0027 is added during update to ntp.conf to allow sntp to work.\n- The local clock is being disabled during update.\n- ntpd is no longer running chrooted.\n\nOther functional changes:\n- ntp-signd is installed.\n- \u0027enable mode7\u0027 can be added to the configuration to allow ntdpc to work as compatibility mode option.\n- \u0027kod\u0027 was removed from the default restrictions.\n- SHA1 keys are used by default instead of MD5 keys.\n\nAlso yast2-ntp-client was updated to match some sntp syntax changes. (bsc#937837)\n\nThese security issues were fixed:\n- CVE-2015-8158: Fixed potential infinite loop in ntpq (bsc#962966).\n- CVE-2015-8138: Zero Origin Timestamp Bypass (bsc#963002).\n- CVE-2015-7979: Off-path Denial of Service (DoS) attack on authenticated broadcast mode (bsc#962784).\n- CVE-2015-7978: Stack exhaustion in recursive traversal of restriction list (bsc#963000).\n- CVE-2015-7977: reslist NULL pointer dereference (bsc#962970).\n- CVE-2015-7976: ntpq saveconfig command allows dangerous characters in filenames (bsc#962802).\n- CVE-2015-7975: nextvar() missing length check (bsc#962988).\n- CVE-2015-7974: Skeleton Key: Missing key check allows impersonation between authenticated peers (bsc#962960).\n- CVE-2015-7973: Replay attack on authenticated broadcast mode (bsc#962995).\n- CVE-2015-8140: ntpq vulnerable to replay attacks (bsc#962994).\n- CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin (bsc#962997).\n- CVE-2015-5300: MITM attacker could have forced ntpd to make a step larger than the panic threshold (bsc#951629).\n- CVE-2015-7871: NAK to the Future: Symmetric association authentication bypass via crypto-NAK (bsc#951608).\n- CVE-2015-7855: decodenetnum() will ASSERT botch instead of returning FAIL on some bogus values (bsc#951608).\n- CVE-2015-7854: Password Length Memory Corruption Vulnerability (bsc#951608).\n- CVE-2015-7853: Invalid length data provided by a custom refclock driver could cause a buffer overflow (bsc#951608).\n- CVE-2015-7852: ntpq atoascii() Memory Corruption Vulnerability (bsc#951608).\n- CVE-2015-7851: saveconfig Directory Traversal Vulnerability (bsc#951608).\n- CVE-2015-7850: remote config logfile-keyfile (bsc#951608).\n- CVE-2015-7849: trusted key use-after-free (bsc#951608).\n- CVE-2015-7848: mode 7 loop counter underrun (bsc#951608).\n- CVE-2015-7701: Slow memory leak in CRYPTO_ASSOC (bsc#951608).\n- CVE-2015-7703: configuration directives \u0027pidfile\u0027 and \u0027driftfile\u0027 should only be allowed locally (bsc#951608).\n- CVE-2015-7704, CVE-2015-7705: Clients that receive a KoD should validate the origin timestamp field (bsc#951608).\n- CVE-2015-7691, CVE-2015-7692, CVE-2015-7702: Incomplete autokey data packet length checks (bsc#951608).\n\nThese non-security issues were fixed:\n- fate#320758 bsc#975981: Enable compile-time support for MS-SNTP (--enable-ntp-signd).\n This replaces the w32 patches in 4.2.4 that added the authreg\n directive.\n- bsc#962318: Call /usr/sbin/sntp with full path to synchronize in start-ntpd.\n When run as cron job, /usr/sbin/ is not in the path, which caused\n the synchronization to fail.\n- bsc#782060: Speedup ntpq.\n- bsc#916617: Add /var/db/ntp-kod.\n- bsc#956773: Add ntp-ENOBUFS.patch to limit a warning that might happen quite a lot on loaded systems.\n- bsc#951559,bsc#975496: Fix the TZ offset output of sntp during DST.\n- Add ntp-fork.patch and build with threads disabled to allow name resolution even when running chrooted.\n- Add a controlkey line to /etc/ntp.conf if one does not already exist to allow runtime configuuration via ntpq.\n- bsc#946386: Temporarily disable memlock to avoid problems due to high memory usage during name resolution.\n- bsc#905885: Use SHA1 instead of MD5 for symmetric keys.\n- Improve runtime configuration:\n * Read keytype from ntp.conf\n * Don\u0027t write ntp keys to syslog.\n- Fix legacy action scripts to pass on command line arguments.\n- bsc#944300: Remove \u0027kod\u0027 from the restrict line in ntp.conf.\n- bsc#936327: Use ntpq instead of deprecated ntpdc in start-ntpd.\n- Add a controlkey to ntp.conf to make the above work.\n- Don\u0027t let \u0027keysdir\u0027 lines in ntp.conf trigger the \u0027keys\u0027 parser.\n- Disable mode 7 (ntpdc) again, now that we don\u0027t use it anymore.\n- Add \u0027addserver\u0027 as a new legacy action.\n- bsc#910063: Fix the comment regarding addserver in ntp.conf.\n- bsc#926510: Disable chroot by default.\n- bsc#920238: Enable ntpdc for backwards compatibility.\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-2016-727,SUSE-SLE-SDK-12-2016-727,SUSE-SLE-SERVER-12-2016-727", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1247-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1247-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161247-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1247-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-May/002043.html" }, { "category": "self", "summary": "SUSE Bug 782060", "url": "https://bugzilla.suse.com/782060" }, { "category": "self", "summary": "SUSE Bug 905885", "url": "https://bugzilla.suse.com/905885" }, { "category": "self", "summary": "SUSE Bug 910063", "url": "https://bugzilla.suse.com/910063" }, { "category": "self", "summary": "SUSE Bug 916617", "url": "https://bugzilla.suse.com/916617" }, { "category": "self", "summary": "SUSE Bug 920238", "url": "https://bugzilla.suse.com/920238" }, { "category": "self", "summary": "SUSE Bug 926510", "url": "https://bugzilla.suse.com/926510" }, { "category": "self", "summary": "SUSE Bug 936327", "url": "https://bugzilla.suse.com/936327" }, { "category": "self", "summary": "SUSE Bug 937837", "url": "https://bugzilla.suse.com/937837" }, { "category": "self", "summary": "SUSE Bug 942587", "url": "https://bugzilla.suse.com/942587" }, { "category": "self", "summary": "SUSE Bug 944300", "url": "https://bugzilla.suse.com/944300" }, { "category": "self", "summary": "SUSE Bug 946386", "url": "https://bugzilla.suse.com/946386" }, { "category": "self", "summary": "SUSE Bug 951559", "url": "https://bugzilla.suse.com/951559" }, { "category": "self", "summary": "SUSE Bug 951608", "url": "https://bugzilla.suse.com/951608" }, { "category": "self", "summary": "SUSE Bug 951629", "url": "https://bugzilla.suse.com/951629" }, { "category": "self", "summary": "SUSE Bug 954982", "url": "https://bugzilla.suse.com/954982" }, { "category": "self", "summary": "SUSE Bug 956773", "url": "https://bugzilla.suse.com/956773" }, { "category": "self", "summary": "SUSE Bug 962318", "url": "https://bugzilla.suse.com/962318" }, { "category": "self", "summary": "SUSE Bug 962784", "url": "https://bugzilla.suse.com/962784" }, { "category": "self", "summary": "SUSE Bug 962802", "url": "https://bugzilla.suse.com/962802" }, { "category": "self", "summary": "SUSE Bug 962960", "url": "https://bugzilla.suse.com/962960" }, { "category": "self", "summary": "SUSE Bug 962966", "url": "https://bugzilla.suse.com/962966" }, { "category": "self", "summary": "SUSE Bug 962970", "url": "https://bugzilla.suse.com/962970" }, { "category": "self", "summary": "SUSE Bug 962988", "url": "https://bugzilla.suse.com/962988" }, { "category": "self", "summary": "SUSE Bug 962994", "url": "https://bugzilla.suse.com/962994" }, { "category": "self", "summary": "SUSE Bug 962995", "url": "https://bugzilla.suse.com/962995" }, { "category": "self", "summary": "SUSE Bug 962997", "url": "https://bugzilla.suse.com/962997" }, { "category": "self", "summary": "SUSE Bug 963000", "url": "https://bugzilla.suse.com/963000" }, { "category": "self", "summary": "SUSE Bug 963002", "url": "https://bugzilla.suse.com/963002" }, { "category": "self", "summary": "SUSE Bug 975496", "url": "https://bugzilla.suse.com/975496" }, { "category": "self", "summary": "SUSE Bug 975981", "url": "https://bugzilla.suse.com/975981" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5300 page", "url": "https://www.suse.com/security/cve/CVE-2015-5300/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7691 page", "url": "https://www.suse.com/security/cve/CVE-2015-7691/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7692 page", "url": "https://www.suse.com/security/cve/CVE-2015-7692/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7701 page", "url": "https://www.suse.com/security/cve/CVE-2015-7701/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7702 page", "url": "https://www.suse.com/security/cve/CVE-2015-7702/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7703 page", "url": "https://www.suse.com/security/cve/CVE-2015-7703/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7704 page", "url": "https://www.suse.com/security/cve/CVE-2015-7704/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7705 page", "url": "https://www.suse.com/security/cve/CVE-2015-7705/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7848 page", "url": "https://www.suse.com/security/cve/CVE-2015-7848/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7849 page", "url": "https://www.suse.com/security/cve/CVE-2015-7849/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7850 page", "url": "https://www.suse.com/security/cve/CVE-2015-7850/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7851 page", "url": "https://www.suse.com/security/cve/CVE-2015-7851/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7852 page", "url": "https://www.suse.com/security/cve/CVE-2015-7852/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7853 page", "url": "https://www.suse.com/security/cve/CVE-2015-7853/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7854 page", "url": "https://www.suse.com/security/cve/CVE-2015-7854/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7855 page", "url": "https://www.suse.com/security/cve/CVE-2015-7855/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7871 page", "url": "https://www.suse.com/security/cve/CVE-2015-7871/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7973 page", "url": "https://www.suse.com/security/cve/CVE-2015-7973/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7974 page", "url": "https://www.suse.com/security/cve/CVE-2015-7974/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7975 page", "url": "https://www.suse.com/security/cve/CVE-2015-7975/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7976 page", "url": "https://www.suse.com/security/cve/CVE-2015-7976/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7977 page", "url": "https://www.suse.com/security/cve/CVE-2015-7977/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7978 page", "url": "https://www.suse.com/security/cve/CVE-2015-7978/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7979 page", "url": "https://www.suse.com/security/cve/CVE-2015-7979/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8138 page", "url": "https://www.suse.com/security/cve/CVE-2015-8138/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8139 page", "url": "https://www.suse.com/security/cve/CVE-2015-8139/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8140 page", "url": "https://www.suse.com/security/cve/CVE-2015-8140/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8158 page", "url": "https://www.suse.com/security/cve/CVE-2015-8158/" } ], "title": "Security update for ntp", "tracking": { "current_release_date": "2016-05-06T07:50:51Z", "generator": { "date": "2016-05-06T07:50:51Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1247-1", "initial_release_date": "2016-05-06T07:50:51Z", "revision_history": [ { "date": "2016-05-06T07:50:51Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "yast2-ntp-client-3.1.12.4-8.2.noarch", "product": { "name": "yast2-ntp-client-3.1.12.4-8.2.noarch", "product_id": "yast2-ntp-client-3.1.12.4-8.2.noarch" } }, { "category": "product_version", "name": "yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch", "product": { "name": "yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch", "product_id": "yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p6-46.5.2.ppc64le", "product": { "name": "ntp-4.2.8p6-46.5.2.ppc64le", "product_id": "ntp-4.2.8p6-46.5.2.ppc64le" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p6-46.5.2.ppc64le", "product": { "name": "ntp-doc-4.2.8p6-46.5.2.ppc64le", "product_id": "ntp-doc-4.2.8p6-46.5.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p6-46.5.2.s390x", "product": { "name": "ntp-4.2.8p6-46.5.2.s390x", "product_id": "ntp-4.2.8p6-46.5.2.s390x" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p6-46.5.2.s390x", "product": { "name": "ntp-doc-4.2.8p6-46.5.2.s390x", "product_id": "ntp-doc-4.2.8p6-46.5.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p6-46.5.2.x86_64", "product": { "name": "ntp-4.2.8p6-46.5.2.x86_64", "product_id": "ntp-4.2.8p6-46.5.2.x86_64" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p6-46.5.2.x86_64", "product": { "name": "ntp-doc-4.2.8p6-46.5.2.x86_64", "product_id": "ntp-doc-4.2.8p6-46.5.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12", "product": { "name": "SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12", "product": { "name": "SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-46.5.2.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64" }, "product_reference": "ntp-4.2.8p6-46.5.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-46.5.2.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64" }, "product_reference": "ntp-doc-4.2.8p6-46.5.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "yast2-ntp-client-3.1.12.4-8.2.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch" }, "product_reference": "yast2-ntp-client-3.1.12.4-8.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" }, "product_reference": "yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-46.5.2.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le" }, "product_reference": "ntp-4.2.8p6-46.5.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-46.5.2.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x" }, "product_reference": "ntp-4.2.8p6-46.5.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-46.5.2.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64" }, "product_reference": "ntp-4.2.8p6-46.5.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-46.5.2.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le" }, "product_reference": "ntp-doc-4.2.8p6-46.5.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-46.5.2.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x" }, "product_reference": "ntp-doc-4.2.8p6-46.5.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-46.5.2.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64" }, "product_reference": "ntp-doc-4.2.8p6-46.5.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "yast2-ntp-client-3.1.12.4-8.2.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch" }, "product_reference": "yast2-ntp-client-3.1.12.4-8.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-46.5.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le" }, "product_reference": "ntp-4.2.8p6-46.5.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-46.5.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x" }, "product_reference": "ntp-4.2.8p6-46.5.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-46.5.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64" }, "product_reference": "ntp-4.2.8p6-46.5.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-46.5.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le" }, "product_reference": "ntp-doc-4.2.8p6-46.5.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-46.5.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x" }, "product_reference": "ntp-doc-4.2.8p6-46.5.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-46.5.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64" }, "product_reference": "ntp-doc-4.2.8p6-46.5.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "yast2-ntp-client-3.1.12.4-8.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch" }, "product_reference": "yast2-ntp-client-3.1.12.4-8.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-5300", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5300" } ], "notes": [ { "category": "general", "text": "The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5300", "url": "https://www.suse.com/security/cve/CVE-2015-5300" }, { "category": "external", "summary": "SUSE Bug 951629 for CVE-2015-5300", "url": "https://bugzilla.suse.com/951629" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-5300", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962624 for CVE-2015-5300", "url": "https://bugzilla.suse.com/962624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "moderate" } ], "title": "CVE-2015-5300" }, { "cve": "CVE-2015-7691", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7691" } ], "notes": [ { "category": "general", "text": "The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted packets containing particular autokey operations. NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7691", "url": "https://www.suse.com/security/cve/CVE-2015-7691" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7691", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 911792 for CVE-2015-7691", "url": "https://bugzilla.suse.com/911792" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7691", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7691", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7691", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "important" } ], "title": "CVE-2015-7691" }, { "cve": "CVE-2015-7692", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7692" } ], "notes": [ { "category": "general", "text": "The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash). NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7692", "url": "https://www.suse.com/security/cve/CVE-2015-7692" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7692", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 911792 for CVE-2015-7692", "url": "https://bugzilla.suse.com/911792" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7692", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7692", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7692", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "important" } ], "title": "CVE-2015-7692" }, { "cve": "CVE-2015-7701", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7701" } ], "notes": [ { "category": "general", "text": "Memory leak in the CRYPTO_ASSOC function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (memory consumption).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7701", "url": "https://www.suse.com/security/cve/CVE-2015-7701" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7701", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7701", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7701", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7701", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "important" } ], "title": "CVE-2015-7701" }, { "cve": "CVE-2015-7702", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7702" } ], "notes": [ { "category": "general", "text": "The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash). NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7702", "url": "https://www.suse.com/security/cve/CVE-2015-7702" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7702", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 911792 for CVE-2015-7702", "url": "https://bugzilla.suse.com/911792" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7702", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7702", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7702", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "important" } ], "title": "CVE-2015-7702" }, { "cve": "CVE-2015-7703", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7703" } ], "notes": [ { "category": "general", "text": "The \"pidfile\" or \"driftfile\" directives in NTP ntpd 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77, when ntpd is configured to allow remote configuration, allows remote attackers with an IP address that is allowed to send configuration requests, and with knowledge of the remote configuration password to write to arbitrary files via the :config command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7703", "url": "https://www.suse.com/security/cve/CVE-2015-7703" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7703", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 943216 for CVE-2015-7703", "url": "https://bugzilla.suse.com/943216" }, { "category": "external", "summary": "SUSE Bug 943218 for CVE-2015-7703", "url": "https://bugzilla.suse.com/943218" }, { "category": "external", "summary": "SUSE Bug 943219 for CVE-2015-7703", "url": "https://bugzilla.suse.com/943219" }, { "category": "external", "summary": "SUSE Bug 943221 for CVE-2015-7703", "url": "https://bugzilla.suse.com/943221" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7703", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7703", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "moderate" } ], "title": "CVE-2015-7703" }, { "cve": "CVE-2015-7704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7704" } ], "notes": [ { "category": "general", "text": "The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted \"KOD\" messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7704", "url": "https://www.suse.com/security/cve/CVE-2015-7704" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7704", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7704", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 952611 for CVE-2015-7704", "url": "https://bugzilla.suse.com/952611" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7704", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2015-7704", "url": "https://bugzilla.suse.com/977446" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "important" } ], "title": "CVE-2015-7704" }, { "cve": "CVE-2015-7705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7705" } ], "notes": [ { "category": "general", "text": "The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7705", "url": "https://www.suse.com/security/cve/CVE-2015-7705" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7705", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7705", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 952611 for CVE-2015-7705", "url": "https://bugzilla.suse.com/952611" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7705", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "critical" } ], "title": "CVE-2015-7705" }, { "cve": "CVE-2015-7848", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7848" } ], "notes": [ { "category": "general", "text": "An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP daemon, it leads to an immediate crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7848", "url": "https://www.suse.com/security/cve/CVE-2015-7848" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7848", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7848", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7848", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7848", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "moderate" } ], "title": "CVE-2015-7848" }, { "cve": "CVE-2015-7849", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7849" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to possibly execute arbitrary code or cause a denial of service (crash) via crafted packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7849", "url": "https://www.suse.com/security/cve/CVE-2015-7849" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7849", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7849", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7849", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7849", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "important" } ], "title": "CVE-2015-7849" }, { "cve": "CVE-2015-7850", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7850" } ], "notes": [ { "category": "general", "text": "ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (infinite loop or crash) by pointing the key file at the log file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7850", "url": "https://www.suse.com/security/cve/CVE-2015-7850" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7850", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7850", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7850", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7850", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "moderate" } ], "title": "CVE-2015-7850" }, { "cve": "CVE-2015-7851", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7851" } ], "notes": [ { "category": "general", "text": "Directory traversal vulnerability in the save_config function in ntpd in ntp_control.c in NTP before 4.2.8p4, when used on systems that do not use \u0027\\\u0027 or \u0027/\u0027 characters for directory separation such as OpenVMS, allows remote authenticated users to overwrite arbitrary files.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7851", "url": "https://www.suse.com/security/cve/CVE-2015-7851" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7851", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7851", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7851", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "moderate" } ], "title": "CVE-2015-7851" }, { "cve": "CVE-2015-7852", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7852" } ], "notes": [ { "category": "general", "text": "ntpq in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted mode 6 response packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7852", "url": "https://www.suse.com/security/cve/CVE-2015-7852" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7852", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7852", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7852", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7852", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "moderate" } ], "title": "CVE-2015-7852" }, { "cve": "CVE-2015-7853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7853" } ], "notes": [ { "category": "general", "text": "The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7853", "url": "https://www.suse.com/security/cve/CVE-2015-7853" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7853", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7853", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7853", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7853", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "critical" } ], "title": "CVE-2015-7853" }, { "cve": "CVE-2015-7854", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7854" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the password management functionality in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7854", "url": "https://www.suse.com/security/cve/CVE-2015-7854" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7854", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7854", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7854", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7854", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "important" } ], "title": "CVE-2015-7854" }, { "cve": "CVE-2015-7855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7855" } ], "notes": [ { "category": "general", "text": "The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (assertion failure) via a 6 or mode 7 packet containing a long data value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7855", "url": "https://www.suse.com/security/cve/CVE-2015-7855" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7855", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7855", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7855", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7855", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "moderate" } ], "title": "CVE-2015-7855" }, { "cve": "CVE-2015-7871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7871" } ], "notes": [ { "category": "general", "text": "Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7871", "url": "https://www.suse.com/security/cve/CVE-2015-7871" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7871", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7871", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 952606 for CVE-2015-7871", "url": "https://bugzilla.suse.com/952606" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7871", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "critical" } ], "title": "CVE-2015-7871" }, { "cve": "CVE-2015-7973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7973" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90, when configured in broadcast mode, allows man-in-the-middle attackers to conduct replay attacks by sniffing the network.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7973", "url": "https://www.suse.com/security/cve/CVE-2015-7973" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7973", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7973", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "moderate" } ], "title": "CVE-2015-7973" }, { "cve": "CVE-2015-7974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7974" } ], "notes": [ { "category": "general", "text": "NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a \"skeleton key.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7974", "url": "https://www.suse.com/security/cve/CVE-2015-7974" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7974", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962960 for CVE-2015-7974", "url": "https://bugzilla.suse.com/962960" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7974", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "low" } ], "title": "CVE-2015-7974" }, { "cve": "CVE-2015-7975", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7975" } ], "notes": [ { "category": "general", "text": "The nextvar function in NTP before 4.2.8p6 and 4.3.x before 4.3.90 does not properly validate the length of its input, which allows an attacker to cause a denial of service (application crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7975", "url": "https://www.suse.com/security/cve/CVE-2015-7975" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7975", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962988 for CVE-2015-7975", "url": "https://bugzilla.suse.com/962988" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7975", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "low" } ], "title": "CVE-2015-7975" }, { "cve": "CVE-2015-7976", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7976" } ], "notes": [ { "category": "general", "text": "The ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows attackers to cause unspecified impact via a crafted filename.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7976", "url": "https://www.suse.com/security/cve/CVE-2015-7976" }, { "category": "external", "summary": "SUSE Bug 962802 for CVE-2015-7976", "url": "https://bugzilla.suse.com/962802" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7976", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "low" } ], "title": "CVE-2015-7976" }, { "cve": "CVE-2015-7977", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7977" } ], "notes": [ { "category": "general", "text": "ntpd in NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (NULL pointer dereference) via a ntpdc reslist command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7977", "url": "https://www.suse.com/security/cve/CVE-2015-7977" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7977", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962970 for CVE-2015-7977", "url": "https://bugzilla.suse.com/962970" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7977", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "moderate" } ], "title": "CVE-2015-7977" }, { "cve": "CVE-2015-7978", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7978" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p6 and 4.3.0 before 4.3.90 allows a remote attackers to cause a denial of service (stack exhaustion) via an ntpdc relist command, which triggers recursive traversal of the restriction list.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7978", "url": "https://www.suse.com/security/cve/CVE-2015-7978" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7978", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962970 for CVE-2015-7978", "url": "https://bugzilla.suse.com/962970" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7978", "url": "https://bugzilla.suse.com/962995" }, { "category": "external", "summary": "SUSE Bug 963000 for CVE-2015-7978", "url": "https://bugzilla.suse.com/963000" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "moderate" } ], "title": "CVE-2015-7978" }, { "cve": "CVE-2015-7979", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7979" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (client-server association tear down) by sending broadcast packets with invalid authentication to a broadcast client.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7979", "url": "https://www.suse.com/security/cve/CVE-2015-7979" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7979", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962784 for CVE-2015-7979", "url": "https://bugzilla.suse.com/962784" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7979", "url": "https://bugzilla.suse.com/962995" }, { "category": "external", "summary": "SUSE Bug 977459 for CVE-2015-7979", "url": "https://bugzilla.suse.com/977459" }, { "category": "external", "summary": "SUSE Bug 982065 for CVE-2015-7979", "url": "https://bugzilla.suse.com/982065" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "moderate" } ], "title": "CVE-2015-7979" }, { "cve": "CVE-2015-8138", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8138" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8138", "url": "https://www.suse.com/security/cve/CVE-2015-8138" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-8138", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-8138", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 963002 for CVE-2015-8138", "url": "https://bugzilla.suse.com/963002" }, { "category": "external", "summary": "SUSE Bug 974668 for CVE-2015-8138", "url": "https://bugzilla.suse.com/974668" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2015-8138", "url": "https://bugzilla.suse.com/977446" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "moderate" } ], "title": "CVE-2015-8138" }, { "cve": "CVE-2015-8139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8139" } ], "notes": [ { "category": "general", "text": "ntpq in NTP before 4.2.8p7 allows remote attackers to obtain origin timestamps and then impersonate peers via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8139", "url": "https://www.suse.com/security/cve/CVE-2015-8139" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-8139", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-8139", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962997 for CVE-2015-8139", "url": "https://bugzilla.suse.com/962997" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "moderate" } ], "title": "CVE-2015-8139" }, { "cve": "CVE-2015-8140", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8140" } ], "notes": [ { "category": "general", "text": "The ntpq protocol in NTP before 4.2.8p7 allows remote attackers to conduct replay attacks by sniffing the network.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8140", "url": "https://www.suse.com/security/cve/CVE-2015-8140" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-8140", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-8140", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962994 for CVE-2015-8140", "url": "https://bugzilla.suse.com/962994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "moderate" } ], "title": "CVE-2015-8140" }, { "cve": "CVE-2015-8158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8158" } ], "notes": [ { "category": "general", "text": "The getresponse function in ntpq in NTP versions before 4.2.8p9 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (infinite loop) via crafted packets with incorrect values.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8158", "url": "https://www.suse.com/security/cve/CVE-2015-8158" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-8158", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962966 for CVE-2015-8158", "url": "https://bugzilla.suse.com/962966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Desktop 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:ntp-doc-4.2.8p6-46.5.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:yast2-ntp-client-3.1.12.4-8.2.noarch", "SUSE Linux Enterprise Software Development Kit 12:yast2-ntp-client-devel-doc-3.1.12.4-8.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-05-06T07:50:51Z", "details": "low" } ], "title": "CVE-2015-8158" } ] }
suse-su-2016:1177-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for ntp", "title": "Title of the patch" }, { "category": "description", "text": "ntp was updated to version 4.2.8p6 to fix 12 security issues.\n\nAlso yast2-ntp-client was updated to match some sntp syntax changes. (bsc#937837)\n\nThese security issues were fixed:\n- CVE-2015-8158: Fixed potential infinite loop in ntpq (bsc#962966).\n- CVE-2015-8138: Zero Origin Timestamp Bypass (bsc#963002).\n- CVE-2015-7979: Off-path Denial of Service (DoS) attack on authenticated broadcast mode (bsc#962784).\n- CVE-2015-7978: Stack exhaustion in recursive traversal of restriction list (bsc#963000).\n- CVE-2015-7977: reslist NULL pointer dereference (bsc#962970).\n- CVE-2015-7976: ntpq saveconfig command allows dangerous characters in filenames (bsc#962802).\n- CVE-2015-7975: nextvar() missing length check (bsc#962988).\n- CVE-2015-7974: Skeleton Key: Missing key check allows impersonation between authenticated peers (bsc#962960).\n- CVE-2015-7973: Replay attack on authenticated broadcast mode (bsc#962995).\n- CVE-2015-8140: ntpq vulnerable to replay attacks (bsc#962994).\n- CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin (bsc#962997).\n- CVE-2015-5300: MITM attacker could have forced ntpd to make a step larger than the panic threshold (bsc#951629).\n\nThese non-security issues were fixed:\n- fate#320758 bsc#975981: Enable compile-time support for MS-SNTP\n (--enable-ntp-signd). This replaces the w32 patches in 4.2.4 that added\n the authreg directive.\n- bsc#962318: Call /usr/sbin/sntp with full path to synchronize in start-ntpd.\n When run as cron job, /usr/sbin/ is not in the path, which caused\n the synchronization to fail.\n- bsc#782060: Speedup ntpq.\n- bsc#916617: Add /var/db/ntp-kod.\n- bsc#956773: Add ntp-ENOBUFS.patch to limit a warning that might happen quite a lot on loaded systems.\n- bsc#951559,bsc#975496: Fix the TZ offset output of sntp during DST.\n- Add ntp-fork.patch and build with threads disabled to allow name resolution even when running chrooted.\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP1-2016-694,SUSE-SLE-SDK-12-SP1-2016-694,SUSE-SLE-SERVER-12-SP1-2016-694", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1177-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1177-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161177-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1177-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-April/002033.html" }, { "category": "self", "summary": "SUSE Bug 782060", "url": "https://bugzilla.suse.com/782060" }, { "category": "self", "summary": "SUSE Bug 916617", "url": "https://bugzilla.suse.com/916617" }, { "category": "self", "summary": "SUSE Bug 937837", "url": "https://bugzilla.suse.com/937837" }, { "category": "self", "summary": "SUSE Bug 951559", "url": "https://bugzilla.suse.com/951559" }, { "category": "self", "summary": "SUSE Bug 951629", "url": "https://bugzilla.suse.com/951629" }, { "category": "self", "summary": "SUSE Bug 956773", "url": "https://bugzilla.suse.com/956773" }, { "category": "self", "summary": "SUSE Bug 962318", "url": "https://bugzilla.suse.com/962318" }, { "category": "self", "summary": "SUSE Bug 962784", "url": "https://bugzilla.suse.com/962784" }, { "category": "self", "summary": "SUSE Bug 962802", "url": "https://bugzilla.suse.com/962802" }, { "category": "self", "summary": "SUSE Bug 962960", "url": "https://bugzilla.suse.com/962960" }, { "category": "self", "summary": "SUSE Bug 962966", "url": "https://bugzilla.suse.com/962966" }, { "category": "self", "summary": "SUSE Bug 962970", "url": "https://bugzilla.suse.com/962970" }, { "category": "self", "summary": "SUSE Bug 962988", "url": "https://bugzilla.suse.com/962988" }, { "category": "self", "summary": "SUSE Bug 962994", "url": "https://bugzilla.suse.com/962994" }, { "category": "self", "summary": "SUSE Bug 962995", "url": "https://bugzilla.suse.com/962995" }, { "category": "self", "summary": "SUSE Bug 962997", "url": "https://bugzilla.suse.com/962997" }, { "category": "self", "summary": "SUSE Bug 963000", "url": "https://bugzilla.suse.com/963000" }, { "category": "self", "summary": "SUSE Bug 963002", "url": "https://bugzilla.suse.com/963002" }, { "category": "self", "summary": "SUSE Bug 975496", "url": "https://bugzilla.suse.com/975496" }, { "category": "self", "summary": "SUSE Bug 975981", "url": "https://bugzilla.suse.com/975981" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5300 page", "url": "https://www.suse.com/security/cve/CVE-2015-5300/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7973 page", "url": "https://www.suse.com/security/cve/CVE-2015-7973/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7974 page", "url": "https://www.suse.com/security/cve/CVE-2015-7974/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7975 page", "url": "https://www.suse.com/security/cve/CVE-2015-7975/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7976 page", "url": "https://www.suse.com/security/cve/CVE-2015-7976/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7977 page", "url": "https://www.suse.com/security/cve/CVE-2015-7977/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7978 page", "url": "https://www.suse.com/security/cve/CVE-2015-7978/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7979 page", "url": "https://www.suse.com/security/cve/CVE-2015-7979/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8138 page", "url": "https://www.suse.com/security/cve/CVE-2015-8138/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8139 page", "url": "https://www.suse.com/security/cve/CVE-2015-8139/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8140 page", "url": "https://www.suse.com/security/cve/CVE-2015-8140/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8158 page", "url": "https://www.suse.com/security/cve/CVE-2015-8158/" } ], "title": "Security update for ntp", "tracking": { "current_release_date": "2016-04-28T13:45:26Z", "generator": { "date": "2016-04-28T13:45:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1177-1", "initial_release_date": "2016-04-28T13:45:26Z", "revision_history": [ { "date": "2016-04-28T13:45:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "yast2-ntp-client-3.1.22-6.2.noarch", "product": { "name": "yast2-ntp-client-3.1.22-6.2.noarch", "product_id": "yast2-ntp-client-3.1.22-6.2.noarch" } }, { "category": "product_version", "name": "yast2-ntp-client-devel-doc-3.1.22-6.2.noarch", "product": { "name": "yast2-ntp-client-devel-doc-3.1.22-6.2.noarch", "product_id": "yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p6-8.2.ppc64le", "product": { "name": "ntp-4.2.8p6-8.2.ppc64le", "product_id": "ntp-4.2.8p6-8.2.ppc64le" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p6-8.2.ppc64le", "product": { "name": "ntp-doc-4.2.8p6-8.2.ppc64le", "product_id": "ntp-doc-4.2.8p6-8.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p6-8.2.s390x", "product": { "name": "ntp-4.2.8p6-8.2.s390x", "product_id": "ntp-4.2.8p6-8.2.s390x" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p6-8.2.s390x", "product": { "name": "ntp-doc-4.2.8p6-8.2.s390x", "product_id": "ntp-doc-4.2.8p6-8.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p6-8.2.x86_64", "product": { "name": "ntp-4.2.8p6-8.2.x86_64", "product_id": "ntp-4.2.8p6-8.2.x86_64" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p6-8.2.x86_64", "product": { "name": "ntp-doc-4.2.8p6-8.2.x86_64", "product_id": "ntp-doc-4.2.8p6-8.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1", "product": { "name": "SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-8.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64" }, "product_reference": "ntp-4.2.8p6-8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-8.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64" }, "product_reference": "ntp-doc-4.2.8p6-8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "yast2-ntp-client-3.1.22-6.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch" }, "product_reference": "yast2-ntp-client-3.1.22-6.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "yast2-ntp-client-devel-doc-3.1.22-6.2.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" }, "product_reference": "yast2-ntp-client-devel-doc-3.1.22-6.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-8.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le" }, "product_reference": "ntp-4.2.8p6-8.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-8.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x" }, "product_reference": "ntp-4.2.8p6-8.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-8.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64" }, "product_reference": "ntp-4.2.8p6-8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-8.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le" }, "product_reference": "ntp-doc-4.2.8p6-8.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-8.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x" }, "product_reference": "ntp-doc-4.2.8p6-8.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-8.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64" }, "product_reference": "ntp-doc-4.2.8p6-8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "yast2-ntp-client-3.1.22-6.2.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch" }, "product_reference": "yast2-ntp-client-3.1.22-6.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-8.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le" }, "product_reference": "ntp-4.2.8p6-8.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-8.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x" }, "product_reference": "ntp-4.2.8p6-8.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-8.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64" }, "product_reference": "ntp-4.2.8p6-8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-8.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le" }, "product_reference": "ntp-doc-4.2.8p6-8.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-8.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x" }, "product_reference": "ntp-doc-4.2.8p6-8.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-8.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64" }, "product_reference": "ntp-doc-4.2.8p6-8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "yast2-ntp-client-3.1.22-6.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch" }, "product_reference": "yast2-ntp-client-3.1.22-6.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-5300", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5300" } ], "notes": [ { "category": "general", "text": "The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5300", "url": "https://www.suse.com/security/cve/CVE-2015-5300" }, { "category": "external", "summary": "SUSE Bug 951629 for CVE-2015-5300", "url": "https://bugzilla.suse.com/951629" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-5300", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962624 for CVE-2015-5300", "url": "https://bugzilla.suse.com/962624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-04-28T13:45:26Z", "details": "moderate" } ], "title": "CVE-2015-5300" }, { "cve": "CVE-2015-7973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7973" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90, when configured in broadcast mode, allows man-in-the-middle attackers to conduct replay attacks by sniffing the network.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7973", "url": "https://www.suse.com/security/cve/CVE-2015-7973" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7973", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7973", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-04-28T13:45:26Z", "details": "moderate" } ], "title": "CVE-2015-7973" }, { "cve": "CVE-2015-7974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7974" } ], "notes": [ { "category": "general", "text": "NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a \"skeleton key.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7974", "url": "https://www.suse.com/security/cve/CVE-2015-7974" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7974", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962960 for CVE-2015-7974", "url": "https://bugzilla.suse.com/962960" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7974", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-04-28T13:45:26Z", "details": "low" } ], "title": "CVE-2015-7974" }, { "cve": "CVE-2015-7975", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7975" } ], "notes": [ { "category": "general", "text": "The nextvar function in NTP before 4.2.8p6 and 4.3.x before 4.3.90 does not properly validate the length of its input, which allows an attacker to cause a denial of service (application crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7975", "url": "https://www.suse.com/security/cve/CVE-2015-7975" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7975", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962988 for CVE-2015-7975", "url": "https://bugzilla.suse.com/962988" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7975", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-04-28T13:45:26Z", "details": "low" } ], "title": "CVE-2015-7975" }, { "cve": "CVE-2015-7976", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7976" } ], "notes": [ { "category": "general", "text": "The ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows attackers to cause unspecified impact via a crafted filename.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7976", "url": "https://www.suse.com/security/cve/CVE-2015-7976" }, { "category": "external", "summary": "SUSE Bug 962802 for CVE-2015-7976", "url": "https://bugzilla.suse.com/962802" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7976", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-04-28T13:45:26Z", "details": "low" } ], "title": "CVE-2015-7976" }, { "cve": "CVE-2015-7977", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7977" } ], "notes": [ { "category": "general", "text": "ntpd in NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (NULL pointer dereference) via a ntpdc reslist command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7977", "url": "https://www.suse.com/security/cve/CVE-2015-7977" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7977", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962970 for CVE-2015-7977", "url": "https://bugzilla.suse.com/962970" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7977", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-04-28T13:45:26Z", "details": "moderate" } ], "title": "CVE-2015-7977" }, { "cve": "CVE-2015-7978", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7978" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p6 and 4.3.0 before 4.3.90 allows a remote attackers to cause a denial of service (stack exhaustion) via an ntpdc relist command, which triggers recursive traversal of the restriction list.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7978", "url": "https://www.suse.com/security/cve/CVE-2015-7978" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7978", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962970 for CVE-2015-7978", "url": "https://bugzilla.suse.com/962970" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7978", "url": "https://bugzilla.suse.com/962995" }, { "category": "external", "summary": "SUSE Bug 963000 for CVE-2015-7978", "url": "https://bugzilla.suse.com/963000" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-04-28T13:45:26Z", "details": "moderate" } ], "title": "CVE-2015-7978" }, { "cve": "CVE-2015-7979", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7979" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (client-server association tear down) by sending broadcast packets with invalid authentication to a broadcast client.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7979", "url": "https://www.suse.com/security/cve/CVE-2015-7979" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7979", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962784 for CVE-2015-7979", "url": "https://bugzilla.suse.com/962784" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7979", "url": "https://bugzilla.suse.com/962995" }, { "category": "external", "summary": "SUSE Bug 977459 for CVE-2015-7979", "url": "https://bugzilla.suse.com/977459" }, { "category": "external", "summary": "SUSE Bug 982065 for CVE-2015-7979", "url": "https://bugzilla.suse.com/982065" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-04-28T13:45:26Z", "details": "moderate" } ], "title": "CVE-2015-7979" }, { "cve": "CVE-2015-8138", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8138" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8138", "url": "https://www.suse.com/security/cve/CVE-2015-8138" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-8138", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-8138", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 963002 for CVE-2015-8138", "url": "https://bugzilla.suse.com/963002" }, { "category": "external", "summary": "SUSE Bug 974668 for CVE-2015-8138", "url": "https://bugzilla.suse.com/974668" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2015-8138", "url": "https://bugzilla.suse.com/977446" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-04-28T13:45:26Z", "details": "moderate" } ], "title": "CVE-2015-8138" }, { "cve": "CVE-2015-8139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8139" } ], "notes": [ { "category": "general", "text": "ntpq in NTP before 4.2.8p7 allows remote attackers to obtain origin timestamps and then impersonate peers via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8139", "url": "https://www.suse.com/security/cve/CVE-2015-8139" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-8139", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-8139", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962997 for CVE-2015-8139", "url": "https://bugzilla.suse.com/962997" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-04-28T13:45:26Z", "details": "moderate" } ], "title": "CVE-2015-8139" }, { "cve": "CVE-2015-8140", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8140" } ], "notes": [ { "category": "general", "text": "The ntpq protocol in NTP before 4.2.8p7 allows remote attackers to conduct replay attacks by sniffing the network.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8140", "url": "https://www.suse.com/security/cve/CVE-2015-8140" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-8140", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-8140", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962994 for CVE-2015-8140", "url": "https://bugzilla.suse.com/962994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-04-28T13:45:26Z", "details": "moderate" } ], "title": "CVE-2015-8140" }, { "cve": "CVE-2015-8158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8158" } ], "notes": [ { "category": "general", "text": "The getresponse function in ntpq in NTP versions before 4.2.8p9 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (infinite loop) via crafted packets with incorrect values.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8158", "url": "https://www.suse.com/security/cve/CVE-2015-8158" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-8158", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962966 for CVE-2015-8158", "url": "https://bugzilla.suse.com/962966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:ntp-doc-4.2.8p6-8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:yast2-ntp-client-3.1.22-6.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:yast2-ntp-client-devel-doc-3.1.22-6.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-04-28T13:45:26Z", "details": "low" } ], "title": "CVE-2015-8158" } ] }
suse-su-2016:1311-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for ntp", "title": "Title of the patch" }, { "category": "description", "text": "\nThis network time protocol server ntp was updated to 4.2.8p6 to fix the following\nissues:\n\nAlso yast2-ntp-client was updated to match some sntp syntax changes. (bsc#937837)\n\nMajor functional changes:\n- The \u0027sntp\u0027 commandline tool changed its option handling in a major way.\n- \u0027controlkey 1\u0027 is added during update to ntp.conf to allow sntp to work.\n- The local clock is being disabled during update.\n- ntpd is no longer running chrooted.\n\n\nOther functional changes:\n- ntp-signd is installed.\n- \u0027enable mode7\u0027 can be added to the configuration to allow ntdpc to work as compatibility mode option.\n- \u0027kod\u0027 was removed from the default restrictions.\n- SHA1 keys are used by default instead of MD5 keys.\n\nThese security issues were fixed:\n- CVE-2015-5219: An endless loop due to incorrect precision to double conversion (bsc#943216).\n- CVE-2015-8158: Fixed potential infinite loop in ntpq (bsc#962966).\n- CVE-2015-8138: Zero Origin Timestamp Bypass (bsc#963002).\n- CVE-2015-7979: Off-path Denial of Service (DoS) attack on authenticated broadcast mode (bsc#962784).\n- CVE-2015-7978: Stack exhaustion in recursive traversal of restriction list (bsc#963000).\n- CVE-2015-7977: reslist NULL pointer dereference (bsc#962970).\n- CVE-2015-7976: ntpq saveconfig command allows dangerous characters in filenames (bsc#962802).\n- CVE-2015-7975: nextvar() missing length check (bsc#962988).\n- CVE-2015-7974: Skeleton Key: Missing key check allows impersonation between authenticated peers (bsc#962960).\n- CVE-2015-7973: Replay attack on authenticated broadcast mode (bsc#962995).\n- CVE-2015-8140: ntpq vulnerable to replay attacks (bsc#962994).\n- CVE-2015-8139: Origin Leak: ntpq and ntpdc, disclose origin (bsc#962997).\n- CVE-2015-5300: MITM attacker could have forced ntpd to make a step larger than the panic threshold (bsc#951629).\n- CVE-2015-7871: NAK to the Future: Symmetric association authentication bypass via crypto-NAK (bsc#951608).\n- CVE-2015-7855: decodenetnum() will ASSERT botch instead of returning FAIL on some bogus values (bsc#951608).\n- CVE-2015-7854: Password Length Memory Corruption Vulnerability (bsc#951608).\n- CVE-2015-7853: Invalid length data provided by a custom refclock driver could cause a buffer overflow (bsc#951608).\n- CVE-2015-7852: ntpq atoascii() Memory Corruption Vulnerability (bsc#951608).\n- CVE-2015-7851: saveconfig Directory Traversal Vulnerability (bsc#951608).\n- CVE-2015-7850: remote config logfile-keyfile (bsc#951608).\n- CVE-2015-7849: trusted key use-after-free (bsc#951608).\n- CVE-2015-7848: mode 7 loop counter underrun (bsc#951608).\n- CVE-2015-7701: Slow memory leak in CRYPTO_ASSOC (bsc#951608).\n- CVE-2015-7703: configuration directives \u0027pidfile\u0027 and \u0027driftfile\u0027 should only be allowed locally (bsc#951608).\n- CVE-2015-7704, CVE-2015-7705: Clients that receive a KoD should validate the origin timestamp field (bsc#951608).\n- CVE-2015-7691, CVE-2015-7692, CVE-2015-7702: Incomplete autokey data packet length checks (bsc#951608).\n\nThese non-security issues were fixed:\n- fate#320758 bsc#975981: Enable compile-time support for MS-SNTP (--enable-ntp-signd).\n This replaces the w32 patches in 4.2.4 that added the authreg\n directive.\n- bsc#962318: Call /usr/sbin/sntp with full path to synchronize in start-ntpd.\n When run as cron job, /usr/sbin/ is not in the path, which caused\n the synchronization to fail.\n- bsc#782060: Speedup ntpq.\n- bsc#916617: Add /var/db/ntp-kod.\n- bsc#956773: Add ntp-ENOBUFS.patch to limit a warning that might happen quite a lot on loaded systems.\n- bsc#951559,bsc#975496: Fix the TZ offset output of sntp during DST.\n- Add ntp-fork.patch and build with threads disabled to allow name resolution even when running chrooted.\n- Add a controlkey line to /etc/ntp.conf if one does not already exist to allow runtime configuuration via ntpq.\n- bsc#946386: Temporarily disable memlock to avoid problems due to high memory usage during name resolution.\n- bsc#905885: Use SHA1 instead of MD5 for symmetric keys.\n- Improve runtime configuration:\n * Read keytype from ntp.conf\n * Don\u0027t write ntp keys to syslog.\n- Fix legacy action scripts to pass on command line arguments.\n- bsc#944300: Remove \u0027kod\u0027 from the restrict line in ntp.conf.\n- bsc#936327: Use ntpq instead of deprecated ntpdc in start-ntpd.\n- Don\u0027t let \u0027keysdir\u0027 lines in ntp.conf trigger the \u0027keys\u0027 parser.\n- Disable mode 7 (ntpdc) again, now that we don\u0027t use it anymore.\n- Add \u0027addserver\u0027 as a new legacy action.\n- bsc#910063: Fix the comment regarding addserver in ntp.conf.\n- bsc#926510: Disable chroot by default.\n- bsc#920238: Enable ntpdc for backwards compatibility.\n- bsc#784760: Remove local clock from default configuration.\n- bsc#942441/fate#319496: Require perl-Socket6.\n- Improve runtime configuration:\n * Read keytype from ntp.conf\n * Don\u0027t write ntp keys to syslog.\n- bsc#920183: Allow -4 and -6 address qualifiers in \u0027server\u0027 directives.\n- Use upstream ntp-wait, because our version is incompatible with\n the new ntpq command line syntax.\n", "title": "Description of the patch" }, { "category": "details", "text": "sleclo50sp3-ntp-12561,sleman21-ntp-12561,slemap21-ntp-12561,slessp2-ntp-12561,slessp3-ntp-12561", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1311-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1311-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161311-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1311-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-May/002064.html" }, { "category": "self", "summary": "SUSE Bug 782060", "url": "https://bugzilla.suse.com/782060" }, { "category": "self", "summary": "SUSE Bug 784760", "url": "https://bugzilla.suse.com/784760" }, { "category": "self", "summary": "SUSE Bug 905885", "url": "https://bugzilla.suse.com/905885" }, { "category": "self", "summary": "SUSE Bug 910063", "url": "https://bugzilla.suse.com/910063" }, { "category": "self", "summary": "SUSE Bug 916617", "url": "https://bugzilla.suse.com/916617" }, { "category": "self", "summary": "SUSE Bug 920183", "url": "https://bugzilla.suse.com/920183" }, { "category": "self", "summary": "SUSE Bug 920238", "url": "https://bugzilla.suse.com/920238" }, { "category": "self", "summary": "SUSE Bug 926510", "url": "https://bugzilla.suse.com/926510" }, { "category": "self", "summary": "SUSE Bug 936327", "url": "https://bugzilla.suse.com/936327" }, { "category": "self", "summary": "SUSE Bug 937837", "url": "https://bugzilla.suse.com/937837" }, { "category": "self", "summary": "SUSE Bug 942441", "url": "https://bugzilla.suse.com/942441" }, { "category": "self", "summary": "SUSE Bug 942587", "url": "https://bugzilla.suse.com/942587" }, { "category": "self", "summary": "SUSE Bug 943216", "url": "https://bugzilla.suse.com/943216" }, { "category": "self", "summary": "SUSE Bug 943218", "url": "https://bugzilla.suse.com/943218" }, { "category": "self", "summary": "SUSE Bug 944300", "url": "https://bugzilla.suse.com/944300" }, { "category": "self", "summary": "SUSE Bug 946386", "url": "https://bugzilla.suse.com/946386" }, { "category": "self", "summary": "SUSE Bug 951351", "url": "https://bugzilla.suse.com/951351" }, { "category": "self", "summary": "SUSE Bug 951559", "url": "https://bugzilla.suse.com/951559" }, { "category": "self", "summary": "SUSE Bug 951608", "url": "https://bugzilla.suse.com/951608" }, { "category": "self", "summary": "SUSE Bug 951629", "url": "https://bugzilla.suse.com/951629" }, { "category": "self", "summary": "SUSE Bug 954982", "url": "https://bugzilla.suse.com/954982" }, { "category": "self", "summary": "SUSE Bug 956773", "url": "https://bugzilla.suse.com/956773" }, { "category": "self", "summary": "SUSE Bug 962318", "url": "https://bugzilla.suse.com/962318" }, { "category": "self", "summary": "SUSE Bug 962784", "url": "https://bugzilla.suse.com/962784" }, { "category": "self", "summary": "SUSE Bug 962802", "url": "https://bugzilla.suse.com/962802" }, { "category": "self", "summary": "SUSE Bug 962960", "url": "https://bugzilla.suse.com/962960" }, { "category": "self", "summary": "SUSE Bug 962966", "url": "https://bugzilla.suse.com/962966" }, { "category": "self", "summary": "SUSE Bug 962970", "url": "https://bugzilla.suse.com/962970" }, { "category": "self", "summary": "SUSE Bug 962988", "url": "https://bugzilla.suse.com/962988" }, { "category": "self", "summary": "SUSE Bug 962994", "url": "https://bugzilla.suse.com/962994" }, { "category": "self", "summary": "SUSE Bug 962995", "url": "https://bugzilla.suse.com/962995" }, { "category": "self", "summary": "SUSE Bug 962997", "url": "https://bugzilla.suse.com/962997" }, { "category": "self", "summary": "SUSE Bug 963000", "url": "https://bugzilla.suse.com/963000" }, { "category": "self", "summary": "SUSE Bug 963002", "url": "https://bugzilla.suse.com/963002" }, { "category": "self", "summary": "SUSE Bug 975496", "url": "https://bugzilla.suse.com/975496" }, { "category": "self", "summary": "SUSE Bug 975981", "url": "https://bugzilla.suse.com/975981" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5194 page", "url": "https://www.suse.com/security/cve/CVE-2015-5194/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5219 page", "url": "https://www.suse.com/security/cve/CVE-2015-5219/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-5300 page", "url": "https://www.suse.com/security/cve/CVE-2015-5300/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7691 page", "url": "https://www.suse.com/security/cve/CVE-2015-7691/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7692 page", "url": "https://www.suse.com/security/cve/CVE-2015-7692/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7701 page", "url": "https://www.suse.com/security/cve/CVE-2015-7701/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7702 page", "url": "https://www.suse.com/security/cve/CVE-2015-7702/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7703 page", "url": "https://www.suse.com/security/cve/CVE-2015-7703/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7704 page", "url": "https://www.suse.com/security/cve/CVE-2015-7704/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7705 page", "url": "https://www.suse.com/security/cve/CVE-2015-7705/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7848 page", "url": "https://www.suse.com/security/cve/CVE-2015-7848/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7849 page", "url": "https://www.suse.com/security/cve/CVE-2015-7849/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7850 page", "url": "https://www.suse.com/security/cve/CVE-2015-7850/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7851 page", "url": "https://www.suse.com/security/cve/CVE-2015-7851/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7852 page", "url": "https://www.suse.com/security/cve/CVE-2015-7852/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7853 page", "url": "https://www.suse.com/security/cve/CVE-2015-7853/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7854 page", "url": "https://www.suse.com/security/cve/CVE-2015-7854/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7855 page", "url": "https://www.suse.com/security/cve/CVE-2015-7855/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7871 page", "url": "https://www.suse.com/security/cve/CVE-2015-7871/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7973 page", "url": "https://www.suse.com/security/cve/CVE-2015-7973/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7974 page", "url": "https://www.suse.com/security/cve/CVE-2015-7974/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7975 page", "url": "https://www.suse.com/security/cve/CVE-2015-7975/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7976 page", "url": "https://www.suse.com/security/cve/CVE-2015-7976/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7977 page", "url": "https://www.suse.com/security/cve/CVE-2015-7977/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7978 page", "url": "https://www.suse.com/security/cve/CVE-2015-7978/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7979 page", "url": "https://www.suse.com/security/cve/CVE-2015-7979/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8138 page", "url": "https://www.suse.com/security/cve/CVE-2015-8138/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8139 page", "url": "https://www.suse.com/security/cve/CVE-2015-8139/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8140 page", "url": "https://www.suse.com/security/cve/CVE-2015-8140/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8158 page", "url": "https://www.suse.com/security/cve/CVE-2015-8158/" } ], "title": "Security update for ntp", "tracking": { "current_release_date": "2016-05-17T09:29:35Z", "generator": { "date": "2016-05-17T09:29:35Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1311-1", "initial_release_date": "2016-05-17T09:29:35Z", "revision_history": [ { "date": "2016-05-17T09:29:35Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p6-41.1.i586", "product": { "name": "ntp-4.2.8p6-41.1.i586", "product_id": "ntp-4.2.8p6-41.1.i586" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p6-41.1.i586", "product": { "name": "ntp-doc-4.2.8p6-41.1.i586", "product_id": "ntp-doc-4.2.8p6-41.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "yast2-ntp-client-2.17.14.1-1.12.1.noarch", "product": { "name": "yast2-ntp-client-2.17.14.1-1.12.1.noarch", "product_id": "yast2-ntp-client-2.17.14.1-1.12.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p6-41.1.s390x", "product": { "name": "ntp-4.2.8p6-41.1.s390x", "product_id": "ntp-4.2.8p6-41.1.s390x" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p6-41.1.s390x", "product": { "name": "ntp-doc-4.2.8p6-41.1.s390x", "product_id": "ntp-doc-4.2.8p6-41.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ntp-4.2.8p6-41.1.x86_64", "product": { "name": "ntp-4.2.8p6-41.1.x86_64", "product_id": "ntp-4.2.8p6-41.1.x86_64" } }, { "category": "product_version", "name": "ntp-doc-4.2.8p6-41.1.x86_64", "product": { "name": "ntp-doc-4.2.8p6-41.1.x86_64", "product_id": "ntp-doc-4.2.8p6-41.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 5", "product": { "name": "SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5", "product_identification_helper": { "cpe": "cpe:/o:suse:cloud:5" } } }, { "category": "product_name", "name": "SUSE Manager 2.1", "product": { "name": "SUSE Manager 2.1", "product_id": "SUSE Manager 2.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:2.1" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 2.1", "product": { "name": "SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:2.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-41.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64" }, "product_reference": "ntp-4.2.8p6-41.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-41.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" }, "product_reference": "ntp-doc-4.2.8p6-41.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-41.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x" }, "product_reference": "ntp-4.2.8p6-41.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-41.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64" }, "product_reference": "ntp-4.2.8p6-41.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-41.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x" }, "product_reference": "ntp-doc-4.2.8p6-41.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-41.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64" }, "product_reference": "ntp-doc-4.2.8p6-41.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-41.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64" }, "product_reference": "ntp-4.2.8p6-41.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-41.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64" }, "product_reference": "ntp-doc-4.2.8p6-41.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-41.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586" }, "product_reference": "ntp-4.2.8p6-41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-41.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x" }, "product_reference": "ntp-4.2.8p6-41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64" }, "product_reference": "ntp-4.2.8p6-41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-41.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586" }, "product_reference": "ntp-doc-4.2.8p6-41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-41.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x" }, "product_reference": "ntp-doc-4.2.8p6-41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64" }, "product_reference": "ntp-doc-4.2.8p6-41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "yast2-ntp-client-2.17.14.1-1.12.1.noarch as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch" }, "product_reference": "yast2-ntp-client-2.17.14.1-1.12.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-41.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586" }, "product_reference": "ntp-4.2.8p6-41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-41.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x" }, "product_reference": "ntp-4.2.8p6-41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64" }, "product_reference": "ntp-4.2.8p6-41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-41.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586" }, "product_reference": "ntp-doc-4.2.8p6-41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-41.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x" }, "product_reference": "ntp-doc-4.2.8p6-41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64" }, "product_reference": "ntp-doc-4.2.8p6-41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-41.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586" }, "product_reference": "ntp-4.2.8p6-41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-41.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x" }, "product_reference": "ntp-4.2.8p6-41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-4.2.8p6-41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64" }, "product_reference": "ntp-4.2.8p6-41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-41.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586" }, "product_reference": "ntp-doc-4.2.8p6-41.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-41.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x" }, "product_reference": "ntp-doc-4.2.8p6-41.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-4.2.8p6-41.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64" }, "product_reference": "ntp-doc-4.2.8p6-41.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-5194", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5194" } ], "notes": [ { "category": "general", "text": "The log_config_command function in ntp_parser.y in ntpd in NTP before 4.2.7p42 allows remote attackers to cause a denial of service (ntpd crash) via crafted logconfig commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5194", "url": "https://www.suse.com/security/cve/CVE-2015-5194" }, { "category": "external", "summary": "SUSE Bug 943216 for CVE-2015-5194", "url": "https://bugzilla.suse.com/943216" }, { "category": "external", "summary": "SUSE Bug 943218 for CVE-2015-5194", "url": "https://bugzilla.suse.com/943218" }, { "category": "external", "summary": "SUSE Bug 943219 for CVE-2015-5194", "url": "https://bugzilla.suse.com/943219" }, { "category": "external", "summary": "SUSE Bug 943221 for CVE-2015-5194", "url": "https://bugzilla.suse.com/943221" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-5194", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "low" } ], "title": "CVE-2015-5194" }, { "cve": "CVE-2015-5219", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5219" } ], "notes": [ { "category": "general", "text": "The ULOGTOD function in ntp.d in SNTP before 4.2.7p366 does not properly perform type conversions from a precision value to a double, which allows remote attackers to cause a denial of service (infinite loop) via a crafted NTP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5219", "url": "https://www.suse.com/security/cve/CVE-2015-5219" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-5219", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 943216 for CVE-2015-5219", "url": "https://bugzilla.suse.com/943216" }, { "category": "external", "summary": "SUSE Bug 943218 for CVE-2015-5219", "url": "https://bugzilla.suse.com/943218" }, { "category": "external", "summary": "SUSE Bug 943219 for CVE-2015-5219", "url": "https://bugzilla.suse.com/943219" }, { "category": "external", "summary": "SUSE Bug 943221 for CVE-2015-5219", "url": "https://bugzilla.suse.com/943221" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-5219", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "important" } ], "title": "CVE-2015-5219" }, { "cve": "CVE-2015-5300", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-5300" } ], "notes": [ { "category": "general", "text": "The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-5300", "url": "https://www.suse.com/security/cve/CVE-2015-5300" }, { "category": "external", "summary": "SUSE Bug 951629 for CVE-2015-5300", "url": "https://bugzilla.suse.com/951629" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-5300", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962624 for CVE-2015-5300", "url": "https://bugzilla.suse.com/962624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "moderate" } ], "title": "CVE-2015-5300" }, { "cve": "CVE-2015-7691", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7691" } ], "notes": [ { "category": "general", "text": "The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted packets containing particular autokey operations. NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7691", "url": "https://www.suse.com/security/cve/CVE-2015-7691" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7691", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 911792 for CVE-2015-7691", "url": "https://bugzilla.suse.com/911792" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7691", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7691", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7691", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "important" } ], "title": "CVE-2015-7691" }, { "cve": "CVE-2015-7692", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7692" } ], "notes": [ { "category": "general", "text": "The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash). NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7692", "url": "https://www.suse.com/security/cve/CVE-2015-7692" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7692", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 911792 for CVE-2015-7692", "url": "https://bugzilla.suse.com/911792" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7692", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7692", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7692", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "important" } ], "title": "CVE-2015-7692" }, { "cve": "CVE-2015-7701", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7701" } ], "notes": [ { "category": "general", "text": "Memory leak in the CRYPTO_ASSOC function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (memory consumption).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7701", "url": "https://www.suse.com/security/cve/CVE-2015-7701" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7701", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7701", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7701", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7701", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "important" } ], "title": "CVE-2015-7701" }, { "cve": "CVE-2015-7702", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7702" } ], "notes": [ { "category": "general", "text": "The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash). NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7702", "url": "https://www.suse.com/security/cve/CVE-2015-7702" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7702", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 911792 for CVE-2015-7702", "url": "https://bugzilla.suse.com/911792" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7702", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7702", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7702", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "important" } ], "title": "CVE-2015-7702" }, { "cve": "CVE-2015-7703", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7703" } ], "notes": [ { "category": "general", "text": "The \"pidfile\" or \"driftfile\" directives in NTP ntpd 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77, when ntpd is configured to allow remote configuration, allows remote attackers with an IP address that is allowed to send configuration requests, and with knowledge of the remote configuration password to write to arbitrary files via the :config command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7703", "url": "https://www.suse.com/security/cve/CVE-2015-7703" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7703", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 943216 for CVE-2015-7703", "url": "https://bugzilla.suse.com/943216" }, { "category": "external", "summary": "SUSE Bug 943218 for CVE-2015-7703", "url": "https://bugzilla.suse.com/943218" }, { "category": "external", "summary": "SUSE Bug 943219 for CVE-2015-7703", "url": "https://bugzilla.suse.com/943219" }, { "category": "external", "summary": "SUSE Bug 943221 for CVE-2015-7703", "url": "https://bugzilla.suse.com/943221" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7703", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7703", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "moderate" } ], "title": "CVE-2015-7703" }, { "cve": "CVE-2015-7704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7704" } ], "notes": [ { "category": "general", "text": "The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted \"KOD\" messages.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7704", "url": "https://www.suse.com/security/cve/CVE-2015-7704" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7704", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7704", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 952611 for CVE-2015-7704", "url": "https://bugzilla.suse.com/952611" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7704", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2015-7704", "url": "https://bugzilla.suse.com/977446" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "important" } ], "title": "CVE-2015-7704" }, { "cve": "CVE-2015-7705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7705" } ], "notes": [ { "category": "general", "text": "The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7705", "url": "https://www.suse.com/security/cve/CVE-2015-7705" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7705", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7705", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 952611 for CVE-2015-7705", "url": "https://bugzilla.suse.com/952611" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7705", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "critical" } ], "title": "CVE-2015-7705" }, { "cve": "CVE-2015-7848", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7848" } ], "notes": [ { "category": "general", "text": "An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP daemon, it leads to an immediate crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7848", "url": "https://www.suse.com/security/cve/CVE-2015-7848" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7848", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7848", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7848", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7848", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "moderate" } ], "title": "CVE-2015-7848" }, { "cve": "CVE-2015-7849", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7849" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to possibly execute arbitrary code or cause a denial of service (crash) via crafted packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7849", "url": "https://www.suse.com/security/cve/CVE-2015-7849" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7849", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7849", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7849", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7849", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "important" } ], "title": "CVE-2015-7849" }, { "cve": "CVE-2015-7850", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7850" } ], "notes": [ { "category": "general", "text": "ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (infinite loop or crash) by pointing the key file at the log file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7850", "url": "https://www.suse.com/security/cve/CVE-2015-7850" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7850", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7850", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7850", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7850", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "moderate" } ], "title": "CVE-2015-7850" }, { "cve": "CVE-2015-7851", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7851" } ], "notes": [ { "category": "general", "text": "Directory traversal vulnerability in the save_config function in ntpd in ntp_control.c in NTP before 4.2.8p4, when used on systems that do not use \u0027\\\u0027 or \u0027/\u0027 characters for directory separation such as OpenVMS, allows remote authenticated users to overwrite arbitrary files.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7851", "url": "https://www.suse.com/security/cve/CVE-2015-7851" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7851", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7851", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7851", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "moderate" } ], "title": "CVE-2015-7851" }, { "cve": "CVE-2015-7852", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7852" } ], "notes": [ { "category": "general", "text": "ntpq in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted mode 6 response packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7852", "url": "https://www.suse.com/security/cve/CVE-2015-7852" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7852", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7852", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7852", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7852", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "moderate" } ], "title": "CVE-2015-7852" }, { "cve": "CVE-2015-7853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7853" } ], "notes": [ { "category": "general", "text": "The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7853", "url": "https://www.suse.com/security/cve/CVE-2015-7853" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7853", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7853", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7853", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7853", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "critical" } ], "title": "CVE-2015-7853" }, { "cve": "CVE-2015-7854", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7854" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the password management functionality in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7854", "url": "https://www.suse.com/security/cve/CVE-2015-7854" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7854", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7854", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7854", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7854", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "important" } ], "title": "CVE-2015-7854" }, { "cve": "CVE-2015-7855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7855" } ], "notes": [ { "category": "general", "text": "The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (assertion failure) via a 6 or mode 7 packet containing a long data value.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7855", "url": "https://www.suse.com/security/cve/CVE-2015-7855" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7855", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7855", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7855", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2015-7855", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "moderate" } ], "title": "CVE-2015-7855" }, { "cve": "CVE-2015-7871", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7871" } ], "notes": [ { "category": "general", "text": "Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7871", "url": "https://www.suse.com/security/cve/CVE-2015-7871" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-7871", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-7871", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 952606 for CVE-2015-7871", "url": "https://bugzilla.suse.com/952606" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7871", "url": "https://bugzilla.suse.com/959243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "critical" } ], "title": "CVE-2015-7871" }, { "cve": "CVE-2015-7973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7973" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90, when configured in broadcast mode, allows man-in-the-middle attackers to conduct replay attacks by sniffing the network.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7973", "url": "https://www.suse.com/security/cve/CVE-2015-7973" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7973", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7973", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "moderate" } ], "title": "CVE-2015-7973" }, { "cve": "CVE-2015-7974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7974" } ], "notes": [ { "category": "general", "text": "NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a \"skeleton key.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7974", "url": "https://www.suse.com/security/cve/CVE-2015-7974" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7974", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962960 for CVE-2015-7974", "url": "https://bugzilla.suse.com/962960" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7974", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "low" } ], "title": "CVE-2015-7974" }, { "cve": "CVE-2015-7975", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7975" } ], "notes": [ { "category": "general", "text": "The nextvar function in NTP before 4.2.8p6 and 4.3.x before 4.3.90 does not properly validate the length of its input, which allows an attacker to cause a denial of service (application crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7975", "url": "https://www.suse.com/security/cve/CVE-2015-7975" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7975", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962988 for CVE-2015-7975", "url": "https://bugzilla.suse.com/962988" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7975", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "low" } ], "title": "CVE-2015-7975" }, { "cve": "CVE-2015-7976", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7976" } ], "notes": [ { "category": "general", "text": "The ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows attackers to cause unspecified impact via a crafted filename.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7976", "url": "https://www.suse.com/security/cve/CVE-2015-7976" }, { "category": "external", "summary": "SUSE Bug 962802 for CVE-2015-7976", "url": "https://bugzilla.suse.com/962802" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7976", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "low" } ], "title": "CVE-2015-7976" }, { "cve": "CVE-2015-7977", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7977" } ], "notes": [ { "category": "general", "text": "ntpd in NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (NULL pointer dereference) via a ntpdc reslist command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7977", "url": "https://www.suse.com/security/cve/CVE-2015-7977" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7977", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962970 for CVE-2015-7977", "url": "https://bugzilla.suse.com/962970" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7977", "url": "https://bugzilla.suse.com/962995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "moderate" } ], "title": "CVE-2015-7977" }, { "cve": "CVE-2015-7978", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7978" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p6 and 4.3.0 before 4.3.90 allows a remote attackers to cause a denial of service (stack exhaustion) via an ntpdc relist command, which triggers recursive traversal of the restriction list.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7978", "url": "https://www.suse.com/security/cve/CVE-2015-7978" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7978", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962970 for CVE-2015-7978", "url": "https://bugzilla.suse.com/962970" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7978", "url": "https://bugzilla.suse.com/962995" }, { "category": "external", "summary": "SUSE Bug 963000 for CVE-2015-7978", "url": "https://bugzilla.suse.com/963000" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "moderate" } ], "title": "CVE-2015-7978" }, { "cve": "CVE-2015-7979", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7979" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (client-server association tear down) by sending broadcast packets with invalid authentication to a broadcast client.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7979", "url": "https://www.suse.com/security/cve/CVE-2015-7979" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-7979", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962784 for CVE-2015-7979", "url": "https://bugzilla.suse.com/962784" }, { "category": "external", "summary": "SUSE Bug 962995 for CVE-2015-7979", "url": "https://bugzilla.suse.com/962995" }, { "category": "external", "summary": "SUSE Bug 977459 for CVE-2015-7979", "url": "https://bugzilla.suse.com/977459" }, { "category": "external", "summary": "SUSE Bug 982065 for CVE-2015-7979", "url": "https://bugzilla.suse.com/982065" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "moderate" } ], "title": "CVE-2015-7979" }, { "cve": "CVE-2015-8138", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8138" } ], "notes": [ { "category": "general", "text": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8138", "url": "https://www.suse.com/security/cve/CVE-2015-8138" }, { "category": "external", "summary": "SUSE Bug 951608 for CVE-2015-8138", "url": "https://bugzilla.suse.com/951608" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-8138", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 963002 for CVE-2015-8138", "url": "https://bugzilla.suse.com/963002" }, { "category": "external", "summary": "SUSE Bug 974668 for CVE-2015-8138", "url": "https://bugzilla.suse.com/974668" }, { "category": "external", "summary": "SUSE Bug 977446 for CVE-2015-8138", "url": "https://bugzilla.suse.com/977446" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "moderate" } ], "title": "CVE-2015-8138" }, { "cve": "CVE-2015-8139", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8139" } ], "notes": [ { "category": "general", "text": "ntpq in NTP before 4.2.8p7 allows remote attackers to obtain origin timestamps and then impersonate peers via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8139", "url": "https://www.suse.com/security/cve/CVE-2015-8139" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-8139", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-8139", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962997 for CVE-2015-8139", "url": "https://bugzilla.suse.com/962997" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "moderate" } ], "title": "CVE-2015-8139" }, { "cve": "CVE-2015-8140", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8140" } ], "notes": [ { "category": "general", "text": "The ntpq protocol in NTP before 4.2.8p7 allows remote attackers to conduct replay attacks by sniffing the network.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8140", "url": "https://www.suse.com/security/cve/CVE-2015-8140" }, { "category": "external", "summary": "SUSE Bug 1010964 for CVE-2015-8140", "url": "https://bugzilla.suse.com/1010964" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-8140", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962994 for CVE-2015-8140", "url": "https://bugzilla.suse.com/962994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "moderate" } ], "title": "CVE-2015-8140" }, { "cve": "CVE-2015-8158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8158" } ], "notes": [ { "category": "general", "text": "The getresponse function in ntpq in NTP versions before 4.2.8p9 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (infinite loop) via crafted packets with incorrect values.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8158", "url": "https://www.suse.com/security/cve/CVE-2015-8158" }, { "category": "external", "summary": "SUSE Bug 959243 for CVE-2015-8158", "url": "https://bugzilla.suse.com/959243" }, { "category": "external", "summary": "SUSE Bug 962966 for CVE-2015-8158", "url": "https://bugzilla.suse.com/962966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:yast2-ntp-client-2.17.14.1-1.12.1.noarch", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p6-41.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.s390x", "SUSE Manager 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-4.2.8p6-41.1.x86_64", "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-4.2.8p6-41.1.x86_64", "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p6-41.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-17T09:29:35Z", "details": "low" } ], "title": "CVE-2015-8158" } ] }
rhsa-2016:0063
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated ntp packages that fix one security issue are now available for Red\nHat Enterprise Linux 6 and 7.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "The Network Time Protocol (NTP) is used to synchronize a computer\u0027s time\nwith a referenced time source.\n\nIt was discovered that ntpd as a client did not correctly check the\noriginate timestamp in received packets. A remote attacker could use this\nflaw to send a crafted packet to an ntpd client that would effectively\ndisable synchronization with the server, or push arbitrary offset/delay\nmeasurements to modify the time on the client. (CVE-2015-8138)\n\nAll ntp users are advised to upgrade to these updated packages, which\ncontain a backported patch to resolve this issue. After installing the\nupdate, the ntpd daemon will restart automatically.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0063", "url": "https://access.redhat.com/errata/RHSA-2016:0063" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1299442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299442" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0063.json" } ], "title": "Red Hat Security Advisory: ntp security update", "tracking": { "current_release_date": "2025-10-09T15:38:43+00:00", "generator": { "date": "2025-10-09T15:38:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2016:0063", "initial_release_date": "2016-01-25T13:45:01+00:00", "revision_history": [ { "date": "2016-01-25T13:45:01+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-01-25T13:45:01+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T15:38:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "product_id": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "product_id": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "product_id": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "product": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "product_id": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-doc@4.2.6p5-5.el6_7.4?arch=noarch" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "product": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "product_id": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-22.el7_2.1?arch=noarch" } } }, { "category": "product_version", "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "product": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "product_id": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-doc@4.2.6p5-22.el7_2.1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.4?arch=i686" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.4?arch=i686" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.4.i686", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.4.i686", "product_id": "ntp-0:4.2.6p5-5.el6_7.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.4?arch=i686" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.4?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.4.src", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.4.src", "product_id": "ntp-0:4.2.6p5-5.el6_7.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.4?arch=src" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.1.src", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.1.src", "product_id": "ntp-0:4.2.6p5-22.el7_2.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.4?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.4?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "product_id": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.4?arch=ppc64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.4?arch=ppc64" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "product_id": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "product_id": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.4?arch=s390x" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.4?arch=s390x" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "product_id": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.4?arch=s390x" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.4?arch=s390x" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.1?arch=s390x" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "product_id": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.1?arch=s390x" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.1?arch=s390x" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "product_id": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.1?arch=ppc64le" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "product_id": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.1?arch=ppc64le" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "product_id": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.1?arch=ppc64le" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.src", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.src", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.src", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.src", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.src", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.src", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.src", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.src", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.src", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.src", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.src", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.src", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.src", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.src", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.src", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.src", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-8138", "cwe": { "id": "CWE-294", "name": "Authentication Bypass by Capture-replay" }, "discovery_date": "2016-01-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1299442" } ], "notes": [ { "category": "description", "text": "It was discovered that ntpd as a client did not correctly check the originate timestamp in received packets. A remote attacker could use this flaw to send a crafted packet to an ntpd client that would effectively disable synchronization with the server, or push arbitrary offset/delay measurements to modify the time on the client.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: missing check for zero originate timestamp", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of ntp as shipped with Red Hat Enterprise Linux 5 as they do not include the affected code, which was introduced in version 4.2.6 of NTP.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-8138" }, { "category": "external", "summary": "RHBZ#1299442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299442" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-8138", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8138" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-8138", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8138" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0077/", "url": "http://www.talosintel.com/reports/TALOS-2016-0077/" } ], "release_date": "2016-01-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-01-25T13:45:01+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0063" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ntp: missing check for zero originate timestamp" } ] }
rhsa-2016_0063
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated ntp packages that fix one security issue are now available for Red\nHat Enterprise Linux 6 and 7.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "The Network Time Protocol (NTP) is used to synchronize a computer\u0027s time\nwith a referenced time source.\n\nIt was discovered that ntpd as a client did not correctly check the\noriginate timestamp in received packets. A remote attacker could use this\nflaw to send a crafted packet to an ntpd client that would effectively\ndisable synchronization with the server, or push arbitrary offset/delay\nmeasurements to modify the time on the client. (CVE-2015-8138)\n\nAll ntp users are advised to upgrade to these updated packages, which\ncontain a backported patch to resolve this issue. After installing the\nupdate, the ntpd daemon will restart automatically.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0063", "url": "https://access.redhat.com/errata/RHSA-2016:0063" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1299442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299442" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0063.json" } ], "title": "Red Hat Security Advisory: ntp security update", "tracking": { "current_release_date": "2024-11-22T09:48:07+00:00", "generator": { "date": "2024-11-22T09:48:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:0063", "initial_release_date": "2016-01-25T13:45:01+00:00", "revision_history": [ { "date": "2016-01-25T13:45:01+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-01-25T13:45:01+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:48:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "product_id": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "product_id": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "product_id": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "product": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "product_id": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-doc@4.2.6p5-5.el6_7.4?arch=noarch" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "product": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "product_id": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-22.el7_2.1?arch=noarch" } } }, { "category": "product_version", "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "product": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "product_id": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-doc@4.2.6p5-22.el7_2.1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.4?arch=i686" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.4?arch=i686" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.4.i686", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.4.i686", "product_id": "ntp-0:4.2.6p5-5.el6_7.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.4?arch=i686" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.4?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.4.src", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.4.src", "product_id": "ntp-0:4.2.6p5-5.el6_7.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.4?arch=src" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.1.src", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.1.src", "product_id": "ntp-0:4.2.6p5-22.el7_2.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.4?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.4?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "product_id": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.4?arch=ppc64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.4?arch=ppc64" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "product_id": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "product_id": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.4?arch=s390x" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.4?arch=s390x" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "product_id": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.4?arch=s390x" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.4?arch=s390x" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.1?arch=s390x" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "product_id": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.1?arch=s390x" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.1?arch=s390x" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "product_id": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.1?arch=ppc64le" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "product_id": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.1?arch=ppc64le" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "product_id": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.1?arch=ppc64le" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.src", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.src", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.src", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.src", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.src", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.src", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.src", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.src", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.src", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.src", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.src", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.src", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.src", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.src", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.src", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.src", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-8138", "cwe": { "id": "CWE-294", "name": "Authentication Bypass by Capture-replay" }, "discovery_date": "2016-01-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1299442" } ], "notes": [ { "category": "description", "text": "It was discovered that ntpd as a client did not correctly check the originate timestamp in received packets. A remote attacker could use this flaw to send a crafted packet to an ntpd client that would effectively disable synchronization with the server, or push arbitrary offset/delay measurements to modify the time on the client.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: missing check for zero originate timestamp", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of ntp as shipped with Red Hat Enterprise Linux 5 as they do not include the affected code, which was introduced in version 4.2.6 of NTP.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-8138" }, { "category": "external", "summary": "RHBZ#1299442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299442" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-8138", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8138" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-8138", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8138" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0077/", "url": "http://www.talosintel.com/reports/TALOS-2016-0077/" } ], "release_date": "2016-01-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-01-25T13:45:01+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0063" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ntp: missing check for zero originate timestamp" } ] }
RHSA-2016:0063
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated ntp packages that fix one security issue are now available for Red\nHat Enterprise Linux 6 and 7.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "The Network Time Protocol (NTP) is used to synchronize a computer\u0027s time\nwith a referenced time source.\n\nIt was discovered that ntpd as a client did not correctly check the\noriginate timestamp in received packets. A remote attacker could use this\nflaw to send a crafted packet to an ntpd client that would effectively\ndisable synchronization with the server, or push arbitrary offset/delay\nmeasurements to modify the time on the client. (CVE-2015-8138)\n\nAll ntp users are advised to upgrade to these updated packages, which\ncontain a backported patch to resolve this issue. After installing the\nupdate, the ntpd daemon will restart automatically.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0063", "url": "https://access.redhat.com/errata/RHSA-2016:0063" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1299442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299442" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0063.json" } ], "title": "Red Hat Security Advisory: ntp security update", "tracking": { "current_release_date": "2025-10-09T15:38:43+00:00", "generator": { "date": "2025-10-09T15:38:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2016:0063", "initial_release_date": "2016-01-25T13:45:01+00:00", "revision_history": [ { "date": "2016-01-25T13:45:01+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-01-25T13:45:01+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T15:38:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "product_id": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.4?arch=x86_64" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "product_id": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "product_id": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "product": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "product_id": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-doc@4.2.6p5-5.el6_7.4?arch=noarch" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "product": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "product_id": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-22.el7_2.1?arch=noarch" } } }, { "category": "product_version", "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "product": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "product_id": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-doc@4.2.6p5-22.el7_2.1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.4?arch=i686" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.4?arch=i686" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.4.i686", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.4.i686", "product_id": "ntp-0:4.2.6p5-5.el6_7.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.4?arch=i686" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.4?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.4.src", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.4.src", "product_id": "ntp-0:4.2.6p5-5.el6_7.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.4?arch=src" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.1.src", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.1.src", "product_id": "ntp-0:4.2.6p5-22.el7_2.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.4?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.4?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "product_id": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.4?arch=ppc64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.4?arch=ppc64" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "product_id": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "product_id": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.4?arch=s390x" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.4?arch=s390x" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "product_id": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.4?arch=s390x" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.4?arch=s390x" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.1?arch=s390x" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "product_id": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.1?arch=s390x" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.1?arch=s390x" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "product_id": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7_2.1?arch=ppc64le" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "product": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "product_id": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7_2.1?arch=ppc64le" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "product": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "product_id": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7_2.1?arch=ppc64le" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "product": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "product_id": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7_2.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.src", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.src", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.src", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.src", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.src", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.src", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.src", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.src", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.i686", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.src", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.src", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.src", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.src", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.src", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.src", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.src", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.src", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7_2.1.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-8138", "cwe": { "id": "CWE-294", "name": "Authentication Bypass by Capture-replay" }, "discovery_date": "2016-01-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1299442" } ], "notes": [ { "category": "description", "text": "It was discovered that ntpd as a client did not correctly check the originate timestamp in received packets. A remote attacker could use this flaw to send a crafted packet to an ntpd client that would effectively disable synchronization with the server, or push arbitrary offset/delay measurements to modify the time on the client.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: missing check for zero originate timestamp", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of ntp as shipped with Red Hat Enterprise Linux 5 as they do not include the affected code, which was introduced in version 4.2.6 of NTP.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-8138" }, { "category": "external", "summary": "RHBZ#1299442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1299442" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-8138", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8138" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-8138", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8138" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit" }, { "category": "external", "summary": "http://www.talosintel.com/reports/TALOS-2016-0077/", "url": "http://www.talosintel.com/reports/TALOS-2016-0077/" } ], "release_date": "2016-01-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-01-25T13:45:01+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0063" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.src", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.4.noarch", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.4.x86_64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.i686", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.ppc64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.s390x", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.4.x86_64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Client-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Client-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Client-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Client-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Client-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7ComputeNode-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7ComputeNode-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7ComputeNode-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Server-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Server-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Server-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Server-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Server-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Workstation-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.src", "7Workstation-optional-7.2.Z:ntp-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:ntp-debuginfo-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:ntp-doc-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-optional-7.2.Z:ntp-perl-0:4.2.6p5-22.el7_2.1.noarch", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:ntpdate-0:4.2.6p5-22.el7_2.1.x86_64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.ppc64le", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.s390x", "7Workstation-optional-7.2.Z:sntp-0:4.2.6p5-22.el7_2.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ntp: missing check for zero originate timestamp" } ] }
var-201701-1135
Vulnerability from variot
NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero. The NTP.org reference implementation of ntpd contains multiple vulnerabilities. NTP is prone to a denial-of-service vulnerability. Successful exploits may allow the attacker to cause a denial-of-service condition. ========================================================================== Ubuntu Security Notice USN-3096-1 October 05, 2016
ntp vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in NTP. A remote attacker could use this issue to perform a replay attack. (CVE-2015-7973)
Matt Street discovered that NTP incorrectly verified peer associations of symmetric keys. A remote attacker could use this issue to perform an impersonation attack. (CVE-2015-7974)
Jonathan Gardner discovered that the NTP ntpq utility incorrectly handled memory. This issue only affected Ubuntu 16.04 LTS. An attacker could possibly use this issue to overwrite arbitrary files. (CVE-2015-7976)
Stephen Gray discovered that NTP incorrectly handled large restrict lists. A remote attacker could use this issue to spoof peer servers. (CVE-2015-8138)
Jonathan Gardner discovered that the NTP ntpq utility did not properly handle certain incorrect values. (CVE-2015-8158)
It was discovered that the NTP cronjob incorrectly cleaned up the statistics directory. A local attacker could possibly use this to escalate privileges. (CVE-2016-0727)
Stephen Gray and Matthew Van Gundy discovered that NTP incorrectly validated crypto-NAKs. A remote attacker could possibly use this issue to prevent clients from synchronizing. (CVE-2016-1547)
Miroslav Lichvar and Jonathan Gardner discovered that NTP incorrectly handled switching to interleaved symmetric mode. A remote attacker could possibly use this issue to prevent clients from synchronizing. (CVE-2016-1548)
Matthew Van Gundy, Stephen Gray and Loganaden Velvindron discovered that NTP incorrectly handled message authentication. A remote attacker could possibly use this issue to recover the message digest key. (CVE-2016-1550)
Yihan Lian discovered that NTP incorrectly handled duplicate IPs on unconfig directives. (CVE-2016-2516)
Yihan Lian discovered that NTP incorrectly handled certail peer associations. A remote attacker could possibly use this issue to cause a denial of service. A remote attacker could possibly use this issue to cause a denial of service. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2016-4956)
In the default installation, attackers would be isolated by the NTP AppArmor profile.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04 LTS: ntp 1:4.2.8p4+dfsg-3ubuntu5.3
Ubuntu 14.04 LTS: ntp 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10
Ubuntu 12.04 LTS: ntp 1:4.2.6.p3+dfsg-1ubuntu3.11
In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
Note: the current version of the following document is available here: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03750en_us
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: hpesbhf03750en_us Version: 1
HPESBHF03750 rev.1 - HPE Network Products including Comware 5, Comware 7 and VCX running NTP, Remote Denial of Service (DoS), Unauthorized Modification, Local Denial of Service (DoS)
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2017-05-25 Last Updated: 2017-05-25
Potential Security Impact: Local: Denial of Service (DoS); Remote: Denial of Service (DoS), Unauthorized Modification
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities with NTP have been addressed for HPE network products including Comware 5, Comware 7 and VCX.
- Comware v5 (CW5) Products All versions - Please refer to the RESOLUTION below for a list of updated products.
- Comware v7 (CW7) Products All versions - Please refer to the RESOLUTION below for a list of updated products.
- VCX Products All versions - Please refer to the RESOLUTION below for a list of updated products.
BACKGROUND
CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2015-7973
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
5.8 (AV:N/AC:M/Au:N/C:N/I:P/A:P)
CVE-2015-7974
3.1 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
2.1 (AV:N/AC:H/Au:S/C:N/I:P/A:N)
CVE-2015-7975
4.0 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
2.1 (AV:L/AC:L/Au:N/C:N/I:N/A:P)
CVE-2015-7979
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVE-2015-8138
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)
CVE-2015-8158
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION
HPE has made the following software updates available to resolve the vulnerabilities in the Comware and VCX products running NTP.
COMWARE 5 Products
- A6600 (Comware 5) - Version: R3303P31
- HP Network Products
- JC165A HP 6600 RPE-X1 Router Module
- JC177A HP 6608 Router
- JC177B HP 6608 Router Chassis
- JC178A HP 6604 Router Chassis
- JC178B HP 6604 Router Chassis
- JC496A HP 6616 Router Chassis
- JC566A HP 6600 RSE-X1 Router Main Processing Unit
- JG780A HP 6600 RSE-X1 TAA-compliant Main Processing Unit
- JG781A HP 6600 RPE-X1 TAA-compliant Main Processing Unit
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- HSR6602 (Comware 5) - Version: R3303P31
- HP Network Products
- JC176A HP 6602 Router Chassis
- JG353A HP HSR6602-G Router
- JG354A HP HSR6602-XG Router
- JG355A HP 6600 MCP-X1 Router Main Processing Unit
- JG356A HP 6600 MCP-X2 Router Main Processing Unit
- JG776A HP HSR6602-G TAA-compliant Router
- JG777A HP HSR6602-XG TAA-compliant Router
- JG778A HP 6600 MCP-X2 Router TAA-compliant Main Processing Unit
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- HSR6800 (Comware 5) - Version: R3303P31
- HP Network Products
- JG361A HP HSR6802 Router Chassis
- JG361B HP HSR6802 Router Chassis
- JG362A HP HSR6804 Router Chassis
- JG362B HP HSR6804 Router Chassis
- JG363A HP HSR6808 Router Chassis
- JG363B HP HSR6808 Router Chassis
- JG364A HP HSR6800 RSE-X2 Router Main Processing Unit
- JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing Unit
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- MSR20 (Comware 5) - Version: R2516P06
- HP Network Products
- JD432A HP A-MSR20-21 Router
- JD662A HP MSR20-20 Router
- JD663A HP A-MSR20-21 Router
- JD663B HP MSR20-21 Router
- JD664A HP MSR20-40 Router
- JF228A HP MSR20-40 Router
- JF283A HP MSR20-20 Router
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- MSR20-1X (Comware 5) - Version: R2516P06
- HP Network Products
- JD431A HP MSR20-10 Router
- JD667A HP MSR20-15 IW Multi-Service Router
- JD668A HP MSR20-13 Multi-Service Router
- JD669A HP MSR20-13 W Multi-Service Router
- JD670A HP MSR20-15 A Multi-Service Router
- JD671A HP MSR20-15 AW Multi-Service Router
- JD672A HP MSR20-15 I Multi-Service Router
- JD673A HP MSR20-11 Multi-Service Router
- JD674A HP MSR20-12 Multi-Service Router
- JD675A HP MSR20-12 W Multi-Service Router
- JD676A HP MSR20-12 T1 Multi-Service Router
- JF236A HP MSR20-15-I Router
- JF237A HP MSR20-15-A Router
- JF238A HP MSR20-15-I-W Router
- JF239A HP MSR20-11 Router
- JF240A HP MSR20-13 Router
- JF241A HP MSR20-12 Router
- JF806A HP MSR20-12-T Router
- JF807A HP MSR20-12-W Router
- JF808A HP MSR20-13-W Router
- JF809A HP MSR20-15-A-W Router
- JF817A HP MSR20-15 Router
- JG209A HP MSR20-12-T-W Router (NA)
- JG210A HP MSR20-13-W Router (NA)
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- MSR 30 (Comware 5) - Version: R2516
- HP Network Products
- JD654A HP MSR30-60 POE Multi-Service Router
- JD657A HP MSR30-40 Multi-Service Router
- JD658A HP MSR30-60 Multi-Service Router
- JD660A HP MSR30-20 POE Multi-Service Router
- JD661A HP MSR30-40 POE Multi-Service Router
- JD666A HP MSR30-20 Multi-Service Router
- JF229A HP MSR30-40 Router
- JF230A HP MSR30-60 Router
- JF232A HP RTMSR3040-AC-OVSAS-H3
- JF235A HP MSR30-20 DC Router
- JF284A HP MSR30-20 Router
- JF287A HP MSR30-40 DC Router
- JF801A HP MSR30-60 DC Router
- JF802A HP MSR30-20 PoE Router
- JF803A HP MSR30-40 PoE Router
- JF804A HP MSR30-60 PoE Router
- JG728A HP MSR30-20 TAA-compliant DC Router
- JG729A HP MSR30-20 TAA-compliant Router
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- MSR 30-16 (Comware 5) - Version: R2516P06
- HP Network Products
- JD659A HP MSR30-16 POE Multi-Service Router
- JD665A HP MSR30-16 Multi-Service Router
- JF233A HP MSR30-16 Router
- JF234A HP MSR30-16 PoE Router,
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- MSR 30-1X (Comware 5) - Version: R2516P06
- HP Network Products
- JF800A HP MSR30-11 Router
- JF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr
- JG182A HP MSR30-11E Router
- JG183A HP MSR30-11F Router
- JG184A HP MSR30-10 DC Router
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- MSR 50 (Comware 5) - Version: R2516P06
- HP Network Products
- JD433A HP MSR50-40 Router
- JD653A HP MSR50 Processor Module
- JD655A HP MSR50-40 Multi-Service Router
- JD656A HP MSR50-60 Multi-Service Router
- JF231A HP MSR50-60 Router
- JF285A HP MSR50-40 DC Router
- JF640A HP MSR50-60 Rtr Chassis w DC PwrSupply
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- MSR 50-G2 (Comware 5) - Version: R2516P06
- HP Network Products
- JD429A HP MSR50 G2 Processor Module
- JD429B HP MSR50 G2 Processor Module
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- MSR 9XX (Comware 5) - Version: R2516P06
- HP Network Products
- JF812A HP MSR900 Router
- JF813A HP MSR920 Router
- JF814A HP MSR900-W Router
- JF815A HP MSR920 2FEWAN/8FELAN/.11 b/g Rtr
- JG207A HP MSR900-W Router (NA)
- JG208A HP MSR920-W Router (NA)
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- MSR 93X (Comware 5) - Version: R2516P06
- HP Network Products
- JG511A HP MSR930 Router
- JG511B HP MSR930 Router
- JG512A HP MSR930 Wireless Router
- JG513A HP MSR930 3G Router
- JG513B HP MSR930 3G Router
- JG514A HP MSR931 Router
- JG514B HP MSR931 Router
- JG515A HP MSR931 3G Router
- JG516A HP MSR933 Router
- JG517A HP MSR933 3G Router
- JG518A HP MSR935 Router
- JG518B HP MSR935 Router
- JG519A HP MSR935 Wireless Router
- JG520A HP MSR935 3G Router
- JG531A HP MSR931 Dual 3G Router
- JG531B HP MSR931 Dual 3G Router
- JG596A HP MSR930 4G LTE/3G CDMA Router
- JG597A HP MSR936 Wireless Router
- JG665A HP MSR930 4G LTE/3G WCDMA Global Router
- JG704A HP MSR930 4G LTE/3G WCDMA ATT Router
- JH009A HP MSR931 Serial (TI) Router
- JH010A HP MSR933 G.SHDSL (TI) Router
- JH011A HP MSR935 ADSL2+ (TI) Router
- JH012A HP MSR930 Wireless 802.11n (NA) Router
- JH012B HP MSR930 Wireless 802.11n (NA) Router
- JH013A HP MSR935 Wireless 802.11n (NA) Router
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- MSR1000 (Comware 5) - Version: R2516P06
- HP Network Products
- JG732A HP MSR1003-8 AC Router
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- 12500 (Comware 5) - Version: R1829P03
- HP Network Products
- JC072B HP 12500 Main Processing Unit
- JC085A HP A12518 Switch Chassis
- JC086A HP A12508 Switch Chassis
- JC652A HP 12508 DC Switch Chassis
- JC653A HP 12518 DC Switch Chassis
- JC654A HP 12504 AC Switch Chassis
- JC655A HP 12504 DC Switch Chassis
- JC808A HP 12500 TAA Main Processing Unit
- JF430A HP A12518 Switch Chassis
- JF430B HP 12518 Switch Chassis
- JF430C HP 12518 AC Switch Chassis
- JF431A HP A12508 Switch Chassis
- JF431B HP 12508 Switch Chassis
- JF431C HP 12508 AC Switch Chassis
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- 9500E (Comware 5) - Version: R1829P03
- HP Network Products
- JC124A HP A9508 Switch Chassis
- JC124B HP 9505 Switch Chassis
- JC125A HP A9512 Switch Chassis
- JC125B HP 9512 Switch Chassis
- JC474A HP A9508-V Switch Chassis
- JC474B HP 9508-V Switch Chassis
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- 10500 (Comware 5) - Version: R1210P03
- HP Network Products
- JC611A HP 10508-V Switch Chassis
- JC612A HP 10508 Switch Chassis
- JC613A HP 10504 Switch Chassis
- JC614A HP 10500 Main Processing Unit
- JC748A HP 10512 Switch Chassis
- JG375A HP 10500 TAA-compliant Main Processing Unit
- JG820A HP 10504 TAA-compliant Switch Chassis
- JG821A HP 10508 TAA-compliant Switch Chassis
- JG822A HP 10508-V TAA-compliant Switch Chassis
- JG823A HP 10512 TAA-compliant Switch Chassis
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- 7500 (Comware 5) - Version: R6710P03
- HP Network Products
- JC666A HP 7503-S 144Gbps Fabric/MPU with PoE Upgradable 20-port Gig-T/4-port GbE Combo
- JC697A HP 7502 TAA-compliant Main Processing Unit
- JC698A HP 7503-S 144Gbps TAA Fabric / MPU with 16 GbE SFP Ports and 8 GbE Combo Ports
- JC699A HP 7500 384Gbps TAA-compliant Fabric / MPU with 2 10GbE XFP Ports
- JC700A HP 7500 384Gbps TAA-compliant Fabric / Main Processing Unit
- JC701A HP 7500 768Gbps TAA-compliant Fabric / Main Processing Unit
- JD193A HP 7500 384Gbps Fabric Module with 2 XFP Ports
- JD193B HP 7500 384Gbps Fabric Module with 2 XFP Ports
- JD194A HP 7500 384Gbps Fabric Module
- JD194B HP 7500 384Gbps Fabric Module
- JD195A HP 7500 384Gbps Advanced Fabric Module
- JD196A HP 7502 Fabric Module
- JD220A HP 7500 768Gbps Fabric Module
- JD224A HP 7500 384Gbps Fabric Module with 12 SFP Ports
- JD238A HP 7510 Switch Chassis
- JD238B HP 7510 Switch Chassis
- JD239A HP 7506 Switch Chassis
- JD239B HP 7506 Switch Chassis
- JD240A HP 7503 Switch Chassis
- JD240B HP 7503 Switch Chassis
- JD241A HP 7506-V Switch Chassis
- JD241B HP 7506-V Switch Chassis
- JD242A HP 7502 Switch Chassis
- JD242B HP 7502 Switch Chassis
- JD243A HP 7503-S Switch Chassis with 1 Fabric Slot
- JD243B HP 7503-S Switch Chassis with 1 Fabric Slot
- JE164A HP E7902 Switch Chassis
- JE165A HP E7903 Switch Chassis
- JE166A HP E7903 1 Fabric Slot Switch Chassis
- JE167A HP E7906 Switch Chassis
- JE168A HP E7906 Vertical Switch Chassis
- JE169A HP E7910 Switch Chassis
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- 6125G/XG Blade Switch - Version: R2112P06
- HP Network Products
- 737220-B21 HP 6125G Blade Switch with TAA
- 737226-B21 HP 6125G/XG Blade Switch with TAA
- 658250-B21 HP 6125G/XG Blade Switch Opt Kit
- 658247-B21 HP 6125G Blade Switch Opt Kit
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- 5800 (Comware 5) - Version: R1810P07
- HP Network Products
- JC099A HP 5800-24G-PoE Switch
- JC099B HP 5800-24G-PoE+ Switch
- JC100A HP 5800-24G Switch
- JC100B HP 5800-24G Switch
- JC101A HP 5800-48G Switch with 2 Slots
- JC101B HP 5800-48G-PoE+ Switch with 2 Interface Slots
- JC103A HP 5800-24G-SFP Switch
- JC103B HP 5800-24G-SFP Switch with 1 Interface Slot
- JC104A HP 5800-48G-PoE Switch
- JC104B HP 5800-48G-PoE+ Switch with 1 Interface Slot
- JC105A HP 5800-48G Switch
- JC105B HP 5800-48G Switch with 1 Interface Slot
- JG254A HP 5800-24G-PoE+ TAA-compliant Switch
- JG254B HP 5800-24G-PoE+ TAA-compliant Switch
- JG255A HP 5800-24G TAA-compliant Switch
- JG255B HP 5800-24G TAA-compliant Switch
- JG256A HP 5800-24G-SFP TAA-compliant Switch with 1 Interface Slot
- JG256B HP 5800-24G-SFP TAA-compliant Switch with 1 Interface Slot
- JG257A HP 5800-48G-PoE+ TAA-compliant Switch with 1 Interface Slot
- JG257B HP 5800-48G-PoE+ TAA-compliant Switch with 1 Interface Slot
- JG258A HP 5800-48G TAA-compliant Switch with 1 Interface Slot
- JG258B HP 5800-48G TAA-compliant Switch with 1 Interface Slot
- JG225A HP 5800AF-48G Switch
- JG225B HP 5800AF-48G Switch
- JG242A HP 5800-48G-PoE+ TAA-compliant Switch with 2 Interface Slots
- JG242B HP 5800-48G-PoE+ TAA-compliant Switch with 2 Interface
- JG243A HP 5820-24XG-SFP+ TAA-compliant Switch
- JG243B HP 5820-24XG-SFP+ TAA-compliant Switch
- JG259A HP 5820X-14XG-SFP+ TAA-compliant Switch with 2 Interface Slots & 1 OAA Slot
- JG259B HP 5820-14XG-SFP+ TAA-compliant Switch with 2 Interface Slots and 1 OAA Slot
- JC106A HP 5820-14XG-SFP+ Switch with 2 Slots
- JC106B HP 5820-14XG-SFP+ Switch with 2 Interface Slots & 1 OAA Slot
- JG219A HP 5820AF-24XG Switch
- JG219B HP 5820AF-24XG Switch
- JC102A HP 5820-24XG-SFP+ Switch
- JC102B HP 5820-24XG-SFP+ Switch
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- 5500 HI (Comware 5) - Version: R5501P28
- HP Network Products
- JG311A HP 5500-24G-4SFP HI Switch with 2 Interface Slots
- JG312A HP 5500-48G-4SFP HI Switch with 2 Interface Slots
- JG541A HP 5500-24G-PoE+-4SFP HI Switch with 2 Interface Slots
- JG542A HP 5500-48G-PoE+-4SFP HI Switch with 2 Interface Slots
- JG543A HP 5500-24G-SFP HI Switch with 2 Interface Slots
- JG679A HP 5500-24G-PoE+-4SFP HI TAA-compliant Switch with 2 Interface Slots
- JG680A HP 5500-48G-PoE+-4SFP HI TAA-compliant Switch with 2 Interface Slots
- JG681A HP 5500-24G-SFP HI TAA-compliant Switch with 2 Interface Slots
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- 5500 EI (Comware 5) - Version: R2221P30
- HP Network Products
- JD373A HP 5500-24G DC EI Switch
- JD374A HP 5500-24G-SFP EI Switch
- JD375A HP 5500-48G EI Switch
- JD376A HP 5500-48G-PoE EI Switch
- JD377A HP 5500-24G EI Switch
- JD378A HP 5500-24G-PoE EI Switch
- JD379A HP 5500-24G-SFP DC EI Switch
- JG240A HP 5500-48G-PoE+ EI Switch with 2 Interface Slots
- JG241A HP 5500-24G-PoE+ EI Switch with 2 Interface Slots
- JG249A HP 5500-24G-SFP EI TAA-compliant Switch with 2 Interface
- JG250A HP 5500-24G EI TAA-compliant Switch with 2 Interface Slots
- JG251A HP 5500-48G EI TAA-compliant Switch with 2 Interface Slots
- JG252A HP 5500-24G-PoE+ EI TAA-compliant Switch with 2 Interface Slots
- JG253A HP 5500-48G-PoE+ EI TAA-compliant Switch with 2 Interface Slots
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- 4800G (Comware 5) - Version: R2221P30
- HP Network Products
- JD007A HP 4800-24G Switch
- JD008A HP 4800-24G-PoE Switch
- JD009A HP 4800-24G-SFP Switch
- JD010A HP 4800-48G Switch
- JD011A HP 4800-48G-PoE Switch
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- 5500SI (Comware 5) - Version: R2221P30
- HP Network Products
- JD369A HP 5500-24G SI Switch
- JD370A HP 5500-48G SI Switch
- JD371A HP 5500-24G-PoE SI Switch
- JD372A HP 5500-48G-PoE SI Switch
- JG238A HP 5500-24G-PoE+ SI Switch with 2 Interface Slots
- JG239A HP 5500-48G-PoE+ SI Switch with 2 Interface Slots
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- 4500G (Comware 5) - Version: R2221P30
- HP Network Products
- JF428A HP 4510-48G Switch
- JF847A HP 4510-24G Switch
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- 5120 EI (Comware 5) - Version: R2221P30
- HP Network Products
- JE066A HP 5120-24G EI Switch
- JE067A HP 5120-48G EI Switch
- JE068A HP 5120-24G EI Switch with 2 Interface Slots
- JE069A HP 5120-48G EI Switch with 2 Interface Slots
- JE070A HP 5120-24G-PoE EI 2-slot Switch
- JE071A HP 5120-48G-PoE EI 2-slot Switch
- JG236A HP 5120-24G-PoE+ EI Switch with 2 Interface Slots
- JG237A HP 5120-48G-PoE+ EI Switch with 2 Interface Slots
- JG245A HP 5120-24G EI TAA-compliant Switch with 2 Interface Slots
- JG246A HP 5120-48G EI TAA-compliant Switch with 2 Interface Slots
- JG247A HP 5120-24G-PoE+ EI TAA-compliant Switch with 2 Slots
- JG248A HP 5120-48G-PoE+ EI TAA-compliant Switch with 2 Slots
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- 4210G (Comware 5) - Version: R2221P30
- HP Network Products
- JF844A HP 4210-24G Switch
- JF845A HP 4210-48G Switch
- JF846A HP 4210-24G-PoE Switch
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- 5120 SI (Comware 5) - Version: R1518P03
- HP Network Products
- JE072A HP 5120-48G SI Switch
- JE072B HPE 5120 48G SI Switch
- JE073A HP 5120-16G SI Switch
- JE073B HPE 5120 16G SI Switch
- JE074A HP 5120-24G SI Switch
- JE074B HPE 5120 24G SI Switch
- JG091A HP 5120-24G-PoE+ (370W) SI Switch
- JG091B HPE 5120 24G PoE+ (370W) SI Switch
- JG092A HP 5120-24G-PoE+ (170W) SI Switch
- JG309B HPE 5120 8G PoE+ (180W) SI Switch
- JG310B HPE 5120 8G PoE+ (65W) SI Switch
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- 3610 (Comware 5) - Version: R5319P16
- HP Network Products
- JD335A HP 3610-48 Switch
- JD336A HP 3610-24-4G-SFP Switch
- JD337A HP 3610-24-2G-2G-SFP Switch
- JD338A HP 3610-24-SFP Switch
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- 3600V2 (Comware 5) - Version: R2111P04
- HP Network Products
- JG299A HP 3600-24 v2 EI Switch
- JG299B HP 3600-24 v2 EI Switch
- JG300A HP 3600-48 v2 EI Switch
- JG300B HP 3600-48 v2 EI Switch
- JG301A HP 3600-24-PoE+ v2 EI Switch
- JG301B HP 3600-24-PoE+ v2 EI Switch
- JG301C HP 3600-24-PoE+ v2 EI Switch
- JG302A HP 3600-48-PoE+ v2 EI Switch
- JG302B HP 3600-48-PoE+ v2 EI Switch
- JG302C HP 3600-48-PoE+ v2 EI Switch
- JG303A HP 3600-24-SFP v2 EI Switch
- JG303B HP 3600-24-SFP v2 EI Switch
- JG304A HP 3600-24 v2 SI Switch
- JG304B HP 3600-24 v2 SI Switch
- JG305A HP 3600-48 v2 SI Switch
- JG305B HP 3600-48 v2 SI Switch
- JG306A HP 3600-24-PoE+ v2 SI Switch
- JG306B HP 3600-24-PoE+ v2 SI Switch
- JG306C HP 3600-24-PoE+ v2 SI Switch
- JG307A HP 3600-48-PoE+ v2 SI Switch
- JG307B HP 3600-48-PoE+ v2 SI Switch
- JG307C HP 3600-48-PoE+ v2 SI Switch
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- 3100V2 (Comware 5) - Version: R5213P03
- HP Network Products
- JD313B HPE 3100 24 PoE v2 EI Switch
- JD318B HPE 3100 8 v2 EI Switch
- JD319B HPE 3100 16 v2 EI Switch
- JD320B HPE 3100 24 v2 EI Switch
- JG221A HPE 3100 8 v2 SI Switch
- JG222A HPE 3100 16 v2 SI Switch
- JG223A HPE 3100 24 v2 SI Switch
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- HP870 (Comware 5) - Version: R2607P55
- HP Network Products
- JG723A HP 870 Unified Wired-WLAN Appliance
- JG725A HP 870 Unified Wired-WLAN TAA-compliant Appliance
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- HP850 (Comware 5) - Version: R2607P55
- HP Network Products
- JG722A HP 850 Unified Wired-WLAN Appliance
- JG724A HP 850 Unified Wired-WLAN TAA-compliant Appliance
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- HP830 (Comware 5) - Version: R3507P55
- HP Network Products
- JG640A HP 830 24-Port PoE+ Unified Wired-WLAN Switch
- JG641A HP 830 8-port PoE+ Unified Wired-WLAN Switch
- JG646A HP 830 24-Port PoE+ Unified Wired-WLAN TAA-compliant Switch
- JG647A HP 830 8-Port PoE+ Unified Wired-WLAN TAA-compliant
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- HP6000 (Comware 5) - Version: R2507P55
- HP Network Products
- JG639A HP 10500/7500 20G Unified Wired-WLAN Module
- JG645A HP 10500/7500 20G Unified Wired-WLAN TAA-compliant Module
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- WX5004-EI (Comware 5) - Version: R2507P55
- HP Network Products
- JD447B HP WX5002 Access Controller
- JD448A HP WX5004 Access Controller
- JD448B HP WX5004 Access Controller
- JD469A HP WX5004 Access Controller
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- SecBlade FW (Comware 5) - Version: R3181P09
- HP Network Products
- JC635A HP 12500 VPN Firewall Module
- JD245A HP 9500 VPN Firewall Module
- JD249A HP 10500/7500 Advanced VPN Firewall Module
- JD250A HP 6600 Firewall Processing Router Module
- JD251A HP 8800 Firewall Processing Module
- JD255A HP 5820 VPN Firewall Module
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- F1000-E (Comware 5) - Version: TBD still fixing
- HP Network Products
- JD272A HP F1000-E VPN Firewall Appliance
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- F1000-A-EI (Comware 5) - Version: TBD still fixing
- HP Network Products
- JG214A HP F1000-A-EI VPN Firewall Appliance
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- F1000-S-EI (Comware 5) - Version: TBD still fixing
- HP Network Products
- JG213A HP F1000-S-EI VPN Firewall Appliance
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- F1000-A-EI/F1000-S-EI - Version: R3734P10
- HP Network Products
- JD272A HP F1000-E VPN Firewall Appliance
- JG214A HP F1000-A-EI VPN Firewall Appliance
- JG213A HP F1000-S-EI VPN Firewall Appliance
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- F5000-A (Comware 5) - Version: F3210P27
- HP Network Products
- JD259A HP A5000-A5 VPN Firewall Chassis
- JG215A HP F5000 Firewall Main Processing Unit
- JG216A HP F5000 Firewall Standalone Chassis
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- U200S and CS (Comware 5) - Version: F5123P34
- HP Network Products
- JD273A HP U200-S UTM Appliance
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- U200A and M (Comware 5) - Version: F5123P34
- HP Network Products
- JD275A HP U200-A UTM Appliance
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- F5000-C/S (Comware 5) - Version: TBD still fixing
- HP Network Products
- JG650A HP F5000-C VPN Firewall Appliance
- JG370A HP F5000-S VPN Firewall Appliance
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- SecBlade III (Comware 5) - Version: TBD still fixing
- HP Network Products
- JG371A HP 12500 20Gbps VPN Firewall Module
- JG372A HP 10500/11900/7500 20Gbps VPN Firewall Module
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- 6600 RSE RU (Comware 5 Low Encryption SW) - Version: R3303P31
- HP Network Products
- JC177A HP 6608 Router
- JC177B HP 6608 Router Chassis
- JC178A HP 6604 Router Chassis
- JC178B HP 6604 Router Chassis
- JC496A HP 6616 Router Chassis
- JC566A HP 6600 RSE-X1 Router Main Processing Unit
- JG780A HP 6600 RSE-X1 TAA-compliant Main Processing Unit
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- 6600 RPE RU (Comware 5 Low Encryption SW) - Version: R3303P31
- HP Network Products
- JC165A HP 6600 RPE-X1 Router Module
- JC177A HP 6608 Router
- JC177B HPE FlexNetwork 6608 Router Chassis
- JC178A HPE FlexNetwork 6604 Router Chassis
- JC178B HPE FlexNetwork 6604 Router Chassis
- JC496A HPE FlexNetwork 6616 Router Chassis
- JG781A HP 6600 RPE-X1 TAA-compliant Main Processing Unit
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- 6602 RU (Comware 5 Low Encryption SW) - Version: R3303P31
- HP Network Products
- JC176A HP 6602 Router Chassis
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- HSR6602 RU (Comware 5 Low Encryption SW) - Version: R3303P31
- HP Network Products
- JC177A HP 6608 Router
- JC177B HP 6608 Router Chassis
- JC178A HP 6604 Router Chassis
- JC178B HP 6604 Router Chassis
- JC496A HP 6616 Router Chassis
- JG353A HP HSR6602-G Router
- JG354A HP HSR6602-XG Router
- JG355A HP 6600 MCP-X1 Router Main Processing Unit
- JG356A HP 6600 MCP-X2 Router Main Processing Unit
- JG776A HP HSR6602-G TAA-compliant Router
- JG777A HP HSR6602-XG TAA-compliant Router
- JG778A HP 6600 MCP-X2 Router TAA-compliant Main Processing Unit
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- HSR6800 RU (Comware 5 Low Encryption SW) - Version: R3303P31
- HP Network Products
- JG361A HP HSR6802 Router Chassis
- JG361B HP HSR6802 Router Chassis
- JG362A HP HSR6804 Router Chassis
- JG362B HP HSR6804 Router Chassis
- JG363A HP HSR6808 Router Chassis
- JG363B HP HSR6808 Router Chassis
- JG364A HP HSR6800 RSE-X2 Router Main Processing Unit
- JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing Unit
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- SMB1910 (Comware 5) - Version: R1115
- HP Network Products
- JG540A HP 1910-48 Switch
- JG539A HP 1910-24-PoE+ Switch
- JG538A HP 1910-24 Switch
- JG537A HP 1910-8 -PoE+ Switch
- JG536A HP 1910-8 Switch
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- SMB1920 (Comware 5) - Version: R1114
- HP Network Products
- JG928A HP 1920-48G-PoE+ (370W) Switch
- JG927A HP 1920-48G Switch
- JG926A HP 1920-24G-PoE+ (370W) Switch
- JG925A HP 1920-24G-PoE+ (180W) Switch
- JG924A HP 1920-24G Switch
- JG923A HP 1920-16G Switch
- JG922A HP 1920-8G-PoE+ (180W) Switch
- JG921A HP 1920-8G-PoE+ (65W) Switch
- JG920A HP 1920-8G Switch
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- V1910 (Comware 5) - Version: R1518P03
- HP Network Products
- JE005A HP 1910-16G Switch
- JE006A HP 1910-24G Switch
- JE007A HP 1910-24G-PoE (365W) Switch
- JE008A HP 1910-24G-PoE(170W) Switch
- JE009A HP 1910-48G Switch
- JG348A HP 1910-8G Switch
- JG349A HP 1910-8G-PoE+ (65W) Switch
- JG350A HP 1910-8G-PoE+ (180W) Switch
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- SMB 1620 (Comware 5) - Version: R1112
- HP Network Products
- JG914A HP 1620-48G Switch
- JG913A HP 1620-24G Switch
- JG912A HP 1620-8G Switch
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- NJ5000 - Version: R1108
- HP Network Products
- JH237A HPE FlexNetwork NJ5000 5G PoE+ Walljack
- CVEs
- CVE-2015-7973
- CVE-2015-7974
COMWARE 7 Products
- 12500 (Comware 7) - Version: R7377P02
- HP Network Products
- JC072B HP 12500 Main Processing Unit
- JC085A HP A12518 Switch Chassis
- JC086A HP A12508 Switch Chassis
- JC652A HP 12508 DC Switch Chassis
- JC653A HP 12518 DC Switch Chassis
- JC654A HP 12504 AC Switch Chassis
- JC655A HP 12504 DC Switch Chassis
- JF430A HP A12518 Switch Chassis
- JF430B HP 12518 Switch Chassis
- JF430C HP 12518 AC Switch Chassis
- JF431A HP A12508 Switch Chassis
- JF431B HP 12508 Switch Chassis
- JF431C HP 12508 AC Switch Chassis
- JG497A HP 12500 MPU w/Comware V7 OS
- JG782A HP FF 12508E AC Switch Chassis
- JG783A HP FF 12508E DC Switch Chassis
- JG784A HP FF 12518E AC Switch Chassis
- JG785A HP FF 12518E DC Switch Chassis
- JG802A HP FF 12500E MPU
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- CVE-2015-7979
- CVE-2015-8138
- 10500 (Comware 7) - Version: R7184
- HP Network Products
- JC611A HP 10508-V Switch Chassis
- JC612A HP 10508 Switch Chassis
- JC613A HP 10504 Switch Chassis
- JC748A HP 10512 Switch Chassis
- JG608A HP FlexFabric 11908-V Switch Chassis
- JG609A HP FlexFabric 11900 Main Processing Unit
- JG820A HP 10504 TAA Switch Chassis
- JG821A HP 10508 TAA Switch Chassis
- JG822A HP 10508-V TAA Switch Chassis
- JG823A HP 10512 TAA Switch Chassis
- JG496A HP 10500 Type A MPU w/Comware v7 OS
- JH198A HP 10500 Type D Main Processing Unit with Comware v7 Operating System
- JH206A HP 10500 Type D TAA-compliant with Comware v7 Operating System Main Processing Unit
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- CVE-2015-7979
- CVE-2015-8138
- 5900 (Comware 7) - Version: R2422P02
- HP Network Products
- JC772A HP 5900AF-48XG-4QSFP+ Switch
- JG296A HP 5920AF-24XG Switch
- JG336A HP 5900AF-48XGT-4QSFP+ Switch
- JG510A HP 5900AF-48G-4XG-2QSFP+ Switch
- JG554A HP 5900AF-48XG-4QSFP+ TAA Switch
- JG555A HP 5920AF-24XG TAA Switch
- JG838A HP FF 5900CP-48XG-4QSFP+ Switch
- JH036A HP FlexFabric 5900CP 48XG 4QSFP+ TAA-Compliant
- JH037A HP 5900AF 48XGT 4QSFP+ TAA-Compliant Switch
- JH038A HP 5900AF 48G 4XG 2QSFP+ TAA-Compliant
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- CVE-2015-7979
- CVE-2015-8138
- MSR1000 (Comware 7) - Version: R0306P52
- HP Network Products
- JG875A HP MSR1002-4 AC Router
- JH060A HP MSR1003-8S AC Router
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- CVE-2015-7979
- CVE-2015-8138
- MSR2000 (Comware 7) - Version: R0306P52
- HP Network Products
- JG411A HP MSR2003 AC Router
- JG734A HP MSR2004-24 AC Router
- JG735A HP MSR2004-48 Router
- JG866A HP MSR2003 TAA-compliant AC Router
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- CVE-2015-7979
- CVE-2015-8138
- MSR3000 (Comware 7) - Version: R0306P52
- HP Network Products
- JG404A HP MSR3064 Router
- JG405A HP MSR3044 Router
- JG406A HP MSR3024 AC Router
- JG407A HP MSR3024 DC Router
- JG408A HP MSR3024 PoE Router
- JG409A HP MSR3012 AC Router
- JG410A HP MSR3012 DC Router
- JG861A HP MSR3024 TAA-compliant AC Router
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- CVE-2015-7979
- CVE-2015-8138
- MSR4000 (Comware 7) - Version: R0306P52
- HP Network Products
- JG402A HP MSR4080 Router Chassis
- JG403A HP MSR4060 Router Chassis
- JG412A HP MSR4000 MPU-100 Main Processing Unit
- JG869A HP MSR4000 TAA-compliant MPU-100 Main Processing Unit
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- CVE-2015-7979
- CVE-2015-8138
- VSR (Comware 7) - Version: E0324
- HP Network Products
- JG810AAE HP VSR1001 Virtual Services Router 60 Day Evaluation Software
- JG811AAE HP VSR1001 Comware 7 Virtual Services Router
- JG812AAE HP VSR1004 Comware 7 Virtual Services Router
- JG813AAE HP VSR1008 Comware 7 Virtual Services Router
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- CVE-2015-7979
- CVE-2015-8138
- 7900 (Comware 7) - Version: R2152
- HP Network Products
- JG682A HP FlexFabric 7904 Switch Chassis
- JG841A HP FlexFabric 7910 Switch Chassis
- JG842A HP FlexFabric 7910 7.2Tbps Fabric / Main Processing Unit
- JH001A HP FlexFabric 7910 2.4Tbps Fabric / Main Processing Unit
- JH122A HP FlexFabric 7904 TAA-compliant Switch Chassis
- JH123A HP FlexFabric 7910 TAA-compliant Switch Chassis
- JH124A HP FlexFabric 7910 7.2Tbps TAA-compliant Fabric/Main Processing Unit
- JH125A HP FlexFabric 7910 2.4Tbps TAA-compliant Fabric/Main Processing Unit
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- CVE-2015-7979
- CVE-2015-8138
- 5130 (Comware 7) - Version: R3115P01
- HP Network Products
- JG932A HP 5130-24G-4SFP+ EI Switch
- JG933A HP 5130-24G-SFP-4SFP+ EI Switch
- JG934A HP 5130-48G-4SFP+ EI Switch
- JG936A HP 5130-24G-PoE+-4SFP+ (370W) EI Switch
- JG937A HP 5130-48G-PoE+-4SFP+ (370W) EI Switch
- JG938A HP 5130-24G-2SFP+-2XGT EI Switch
- JG939A HP 5130-48G-2SFP+-2XGT EI Switch
- JG940A HP 5130-24G-PoE+-2SFP+-2XGT (370W) EI Switch
- JG941A HP 5130-48G-PoE+-2SFP+-2XGT (370W) EI Switch
- JG975A HP 5130-24G-4SFP+ EI Brazil Switch
- JG976A HP 5130-48G-4SFP+ EI Brazil Switch
- JG977A HP 5130-24G-PoE+-4SFP+ (370W) EI Brazil Switch
- JG978A HP 5130-48G-PoE+-4SFP+ (370W) EI Brazil Switch
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- CVE-2015-7979
- CVE-2015-8138
- 6125XLG - Version: R2422P02
- HP Network Products
- 711307-B21 HP 6125XLG Blade Switch
- 737230-B21 HP 6125XLG Blade Switch with TAA
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- CVE-2015-7979
- CVE-2015-8138
- 6127XLG - Version: R2422P02
- HP Network Products
- 787635-B21 HP 6127XLG Blade Switch Opt Kit
- 787635-B22 HP 6127XLG Blade Switch with TAA
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- CVE-2015-7979
- CVE-2015-8138
- Moonshot - Version: R2422P02
- HP Network Products
- 786617-B21 - HP Moonshot-45Gc Switch Module
- 704654-B21 - HP Moonshot-45XGc Switch Module
- 786619-B21 - HP Moonshot-180XGc Switch Module
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- CVE-2015-7979
- CVE-2015-8138
- 5700 (Comware 7) - Version: R2422P02
- HP Network Products
- JG894A HP FlexFabric 5700-48G-4XG-2QSFP+ Switch
- JG895A HP FlexFabric 5700-48G-4XG-2QSFP+ TAA-compliant Switch
- JG896A HP FlexFabric 5700-40XG-2QSFP+ Switch
- JG897A HP FlexFabric 5700-40XG-2QSFP+ TAA-compliant Switch
- JG898A HP FlexFabric 5700-32XGT-8XG-2QSFP+ Switch
- JG899A HP FlexFabric 5700-32XGT-8XG-2QSFP+ TAA-compliant Switch
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- CVE-2015-7979
- CVE-2015-8138
- 5930 (Comware 7) - Version: R2422P02
- HP Network Products
- JG726A HP FlexFabric 5930 32QSFP+ Switch
- JG727A HP FlexFabric 5930 32QSFP+ TAA-compliant Switch
- JH178A HP FlexFabric 5930 2QSFP+ 2-slot Switch
- JH179A HP FlexFabric 5930 4-slot Switch
- JH187A HP FlexFabric 5930 2QSFP+ 2-slot TAA-compliant Switch
- JH188A HP FlexFabric 5930 4-slot TAA-compliant Switch
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- CVE-2015-7979
- CVE-2015-8138
- HSR6600 (Comware 7) - Version: R7103P09
- HP Network Products
- JG353A HP HSR6602-G Router
- JG354A HP HSR6602-XG Router
- JG776A HP HSR6602-G TAA-compliant Router
- JG777A HP HSR6602-XG TAA-compliant Router
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- CVE-2015-7979
- CVE-2015-8138
- HSR6800 (Comware 7) - Version: R7103P10
- HP Network Products
- JG361A HP HSR6802 Router Chassis
- JG361B HP HSR6802 Router Chassis
- JG362A HP HSR6804 Router Chassis
- JG362B HP HSR6804 Router Chassis
- JG363A HP HSR6808 Router Chassis
- JG363B HP HSR6808 Router Chassis
- JG364A HP HSR6800 RSE-X2 Router Main Processing Unit
- JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing
- JH075A HP HSR6800 RSE-X3 Router Main Processing Unit
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- CVE-2015-7979
- CVE-2015-8138
- 1950 (Comware 7) - Version: R3115P01
- HP Network Products
- JG960A HP 1950-24G-4XG Switch
- JG961A HP 1950-48G-2SFP+-2XGT Switch
- JG962A HP 1950-24G-2SFP+-2XGT-PoE+(370W) Switch
- JG963A HP 1950-48G-2SFP+-2XGT-PoE+(370W) Switch
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- CVE-2015-7979
- CVE-2015-8138
- 7500 (Comware 7) - Version: R7184
- HP Network Products
- JD238C HP 7510 Switch Chassis
- JD239C HP 7506 Switch Chassis
- JD240C HP 7503 Switch Chassis
- JD242C HP 7502 Switch Chassis
- JH207A HP 7500 1.2Tbps Fabric with 2-port 40GbE QSFP+ for IRF-Only Main Processing Unit
- JH208A HP 7502 Main Processing Unit
- JH209A HP 7500 2.4Tbps Fabric with 8-port 1/10GbE SFP+ and 2-port 40GbE QSFP+ Main Processing Unit
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- CVE-2015-7979
- CVE-2015-8138
- 5510HI (Comware 7) - Version: R1120P10
- HP Network Products
- JH145A HPE 5510 24G 4SFP+ HI 1-slot Switch
- JH146A HPE 5510 48G 4SFP+ HI 1-slot Switch
- JH147A HPE 5510 24G PoE+ 4SFP+ HI 1-slot Switch
- JH148A HPE 5510 48G PoE+ 4SFP+ HI 1-slot Switch
- JH149A HPE 5510 24G SFP 4SFP+ HI 1-slot Switch
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- CVE-2015-7979
- CVE-2015-8138
- 5130HI (Comware 7) - Version: R1120P10
- HP Network Products
- JH323A HPE 5130 24G 4SFP+ 1-slot HI Switch
- JH324A HPE 5130 48G 4SFP+ 1-slot HI Switch
- JH325A HPE 5130 24G PoE+ 4SFP+ 1-slot HI Switch
- JH326A HPE 5130 48G PoE+ 4SFP+ 1-slot HI Switch
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- CVE-2015-7979
- CVE-2015-8138
- 5940 - Version: R2508
- HP Network Products
- JH390A HPE FlexFabric 5940 48SFP+ 6QSFP28 Switch
- JH391A HPE FlexFabric 5940 48XGT 6QSFP28 Switch
- JH394A HPE FlexFabric 5940 48XGT 6QSFP+ Switch
- JH395A HPE FlexFabric 5940 48SFP+ 6QSFP+ Switch
- JH396A HPE FlexFabric 5940 32QSFP+ Switch
- JH397A HPE FlexFabric 5940 2-slot Switch
- JH398A HPE FlexFabric 5940 4-slot Switch
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- CVE-2015-7979
- CVE-2015-8138
- 12900E (Comware 7) - Version: R2609
- HP Network Products
- JG619A HP FlexFabric 12910 Switch AC Chassis
- JG621A HP FlexFabric 12910 Main Processing Unit
- JG632A HP FlexFabric 12916 Switch AC Chassis
- JG634A HP FlexFabric 12916 Main Processing Unit
- JH104A HP FlexFabric 12900E Main Processing Unit
- JH114A HP FlexFabric 12910 TAA-compliant Main Processing Unit
- JH263A HP FlexFabric 12904E Main Processing Unit
- JH255A HP FlexFabric 12908E Switch Chassis
- JH262A HP FlexFabric 12904E Switch Chassis
- JH113A HP FlexFabric 12910 TAA-compliant Switch AC Chassis
- JH103A HP FlexFabric 12916E Switch Chassis
- CVEs
- CVE-2015-7973
- CVE-2015-7974
- CVE-2015-7979
- CVE-2015-8138
VCX Products
- VCX - Version: 9.8.19
- HP Network Products
- J9672A HP VCX V7205 Platform w/ DL360 G7 Srvr
- J9668A HP VCX IPC V7005 Pltfrm w/ DL120 G6 Srvr
- JC517A HP VCX V7205 Platform w/DL 360 G6 Server
- JE355A HP VCX V6000 Branch Platform 9.0
- JC516A HP VCX V7005 Platform w/DL 120 G6 Server
- JC518A HP VCX Connect 200 Primry 120 G6 Server
- J9669A HP VCX IPC V7310 Pltfrm w/ DL360 G7 Srvr
- JE341A HP VCX Connect 100 Secondary
- JE252A HP VCX Connect Primary MIM Module
- JE253A HP VCX Connect Secondary MIM Module
- JE254A HP VCX Branch MIM Module
- JE355A HP VCX V6000 Branch Platform 9.0
- JD028A HP MS30-40 RTR w/VCX + T1/FXO/FXS/Mod
- JD023A HP MSR30-40 Router with VCX MIM Module
- JD024A HP MSR30-16 RTR w/VCX Ent Br Com MIM
- JD025A HP MSR30-16 RTR w/VCX + 4FXO/2FXS Mod
- JD026A HP MSR30-16 RTR w/VCX + 8FXO/4FXS Mod
- JD027A HP MSR30-16 RTR w/VCX + 8BRI/4FXS Mod
- JD029A HP MSR30-16 RTR w/VCX + E1/4BRI/4FXS
- JE340A HP VCX Connect 100 Pri Server 9.0
- JE342A HP VCX Connect 100 Sec Server 9.0
- CVEs
- CVE-2015-7975
- CVE-2015-8158
Note: Please contact HPE Technical Support if any assistance is needed acquiring the software updates.
HISTORY Version:1 (rev.1) - 25 May 2017 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.
Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/ntp-4.2.8p6-i486-1_slack14.1.txz: Upgraded. In addition to bug fixes and enhancements, this release fixes several low and medium severity vulnerabilities. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7973 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7975 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7976 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158 ( Security fix ) +--------------------------+
Where to find the new packages: +-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.
Updated package for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/ntp-4.2.8p6-i486-1_slack13.0.txz
Updated package for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/ntp-4.2.8p6-x86_64-1_slack13.0.txz
Updated package for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/ntp-4.2.8p6-i486-1_slack13.1.txz
Updated package for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/ntp-4.2.8p6-x86_64-1_slack13.1.txz
Updated package for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/ntp-4.2.8p6-i486-1_slack13.37.txz
Updated package for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/ntp-4.2.8p6-x86_64-1_slack13.37.txz
Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/ntp-4.2.8p6-i486-1_slack14.0.txz
Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/ntp-4.2.8p6-x86_64-1_slack14.0.txz
Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/ntp-4.2.8p6-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/ntp-4.2.8p6-x86_64-1_slack14.1.txz
Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/ntp-4.2.8p6-i586-1.txz
Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/ntp-4.2.8p6-x86_64-1.txz
MD5 signatures: +-------------+
Slackware 13.0 package: 31365ae4f12849e65d4ad1c8c7d5f89a ntp-4.2.8p6-i486-1_slack13.0.txz
Slackware x86_64 13.0 package: 5a2d24bdacd8dd05ab9e0613c829212b ntp-4.2.8p6-x86_64-1_slack13.0.txz
Slackware 13.1 package: e70f7422bc81c144e6fac1df2c202634 ntp-4.2.8p6-i486-1_slack13.1.txz
Slackware x86_64 13.1 package: f6637f6d24b94a6b17c68467956a6283 ntp-4.2.8p6-x86_64-1_slack13.1.txz
Slackware 13.37 package: 82601e105f95e324dfd1e2f0df513673 ntp-4.2.8p6-i486-1_slack13.37.txz
Slackware x86_64 13.37 package: d3ba32d46f7eef8f75a3444bbee4c677 ntp-4.2.8p6-x86_64-1_slack13.37.txz
Slackware 14.0 package: c5ff13e58fbbea0b7a677e947449e7b1 ntp-4.2.8p6-i486-1_slack14.0.txz
Slackware x86_64 14.0 package: 9e2abfaf0b0b7bf84a8a4db89f60eff6 ntp-4.2.8p6-x86_64-1_slack14.0.txz
Slackware 14.1 package: e1e6b84808b7562314e0e29479153553 ntp-4.2.8p6-i486-1_slack14.1.txz
Slackware x86_64 14.1 package: 8db0a4ca68805c7f5e487d5bcd69d098 ntp-4.2.8p6-x86_64-1_slack14.1.txz
Slackware -current package: f96f443f54a74c20b5eb67467f5958ea n/ntp-4.2.8p6-i586-1.txz
Slackware x86_64 -current package: 5e256f2e1906b4c75047a966996a7a41 n/ntp-4.2.8p6-x86_64-1.txz
Installation instructions: +------------------------+
Upgrade the package as root:
upgradepkg ntp-4.2.8p6-i486-1_slack14.1.txz
Then, restart the NTP daemon:
sh /etc/rc.d/rc.ntpd restart
+-----+
Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com
+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address.
Gentoo Linux Security Advisory GLSA 201607-15
https://security.gentoo.org/
Severity: Normal Title: NTP: Multiple vulnerabilities Date: July 20, 2016 Bugs: #563774, #572452, #581528, #584954 ID: 201607-15
Synopsis
Multiple vulnerabilities have been found in NTP, the worst of which could lead to Denial of Service. Please review the CVE identifiers referenced below for details.
Resolution
All NTP users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/ntp-4.2.8_p8"
References
[ 1 ] CVE-2015-7691 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7691 [ 2 ] CVE-2015-7692 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7692 [ 3 ] CVE-2015-7701 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7701 [ 4 ] CVE-2015-7702 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7702 [ 5 ] CVE-2015-7703 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7703 [ 6 ] CVE-2015-7704 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7704 [ 7 ] CVE-2015-7705 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7705 [ 8 ] CVE-2015-7848 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7848 [ 9 ] CVE-2015-7849 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7849 [ 10 ] CVE-2015-7850 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7850 [ 11 ] CVE-2015-7851 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7851 [ 12 ] CVE-2015-7852 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7852 [ 13 ] CVE-2015-7853 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7853 [ 14 ] CVE-2015-7854 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7854 [ 15 ] CVE-2015-7855 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7855 [ 16 ] CVE-2015-7871 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7871 [ 17 ] CVE-2015-7973 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7973 [ 18 ] CVE-2015-7974 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7974 [ 19 ] CVE-2015-7975 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7975 [ 20 ] CVE-2015-7976 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7976 [ 21 ] CVE-2015-7977 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7977 [ 22 ] CVE-2015-7978 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7978 [ 23 ] CVE-2015-7979 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7979 [ 24 ] CVE-2015-8138 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8138 [ 25 ] CVE-2015-8139 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8139 [ 26 ] CVE-2015-8140 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8140 [ 27 ] CVE-2015-8158 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8158 [ 28 ] CVE-2016-1547 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1547 [ 29 ] CVE-2016-1548 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1548 [ 30 ] CVE-2016-1549 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1549 [ 31 ] CVE-2016-1550 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1550 [ 32 ] CVE-2016-1551 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1551 [ 33 ] CVE-2016-2516 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2516 [ 34 ] CVE-2016-2517 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2517 [ 35 ] CVE-2016-2518 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2518 [ 36 ] CVE-2016-2519 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2519 [ 37 ] CVE-2016-4953 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4953 [ 38 ] CVE-2016-4954 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4954 [ 39 ] CVE-2016-4955 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4955 [ 40 ] CVE-2016-4956 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4956 [ 41 ] CVE-2016-4957 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4957
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201607-15
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Important: ntp security update Advisory ID: RHSA-2016:0063-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-0063.html Issue date: 2016-01-25 CVE Names: CVE-2015-8138 =====================================================================
- Summary:
Updated ntp packages that fix one security issue are now available for Red Hat Enterprise Linux 6 and 7.
Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64
- Description:
The Network Time Protocol (NTP) is used to synchronize a computer's time with a referenced time source.
It was discovered that ntpd as a client did not correctly check the originate timestamp in received packets. A remote attacker could use this flaw to send a crafted packet to an ntpd client that would effectively disable synchronization with the server, or push arbitrary offset/delay measurements to modify the time on the client. (CVE-2015-8138)
All ntp users are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. After installing the update, the ntpd daemon will restart automatically.
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1299442 - CVE-2015-8138 ntp: missing check for zero originate timestamp
- Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source: ntp-4.2.6p5-5.el6_7.4.src.rpm
i386: ntp-4.2.6p5-5.el6_7.4.i686.rpm ntp-debuginfo-4.2.6p5-5.el6_7.4.i686.rpm ntpdate-4.2.6p5-5.el6_7.4.i686.rpm
x86_64: ntp-4.2.6p5-5.el6_7.4.x86_64.rpm ntp-debuginfo-4.2.6p5-5.el6_7.4.x86_64.rpm ntpdate-4.2.6p5-5.el6_7.4.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
i386: ntp-debuginfo-4.2.6p5-5.el6_7.4.i686.rpm ntp-perl-4.2.6p5-5.el6_7.4.i686.rpm
noarch: ntp-doc-4.2.6p5-5.el6_7.4.noarch.rpm
x86_64: ntp-debuginfo-4.2.6p5-5.el6_7.4.x86_64.rpm ntp-perl-4.2.6p5-5.el6_7.4.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: ntp-4.2.6p5-5.el6_7.4.src.rpm
x86_64: ntp-4.2.6p5-5.el6_7.4.x86_64.rpm ntp-debuginfo-4.2.6p5-5.el6_7.4.x86_64.rpm ntpdate-4.2.6p5-5.el6_7.4.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
noarch: ntp-doc-4.2.6p5-5.el6_7.4.noarch.rpm
x86_64: ntp-debuginfo-4.2.6p5-5.el6_7.4.x86_64.rpm ntp-perl-4.2.6p5-5.el6_7.4.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: ntp-4.2.6p5-5.el6_7.4.src.rpm
i386: ntp-4.2.6p5-5.el6_7.4.i686.rpm ntp-debuginfo-4.2.6p5-5.el6_7.4.i686.rpm ntpdate-4.2.6p5-5.el6_7.4.i686.rpm
ppc64: ntp-4.2.6p5-5.el6_7.4.ppc64.rpm ntp-debuginfo-4.2.6p5-5.el6_7.4.ppc64.rpm ntpdate-4.2.6p5-5.el6_7.4.ppc64.rpm
s390x: ntp-4.2.6p5-5.el6_7.4.s390x.rpm ntp-debuginfo-4.2.6p5-5.el6_7.4.s390x.rpm ntpdate-4.2.6p5-5.el6_7.4.s390x.rpm
x86_64: ntp-4.2.6p5-5.el6_7.4.x86_64.rpm ntp-debuginfo-4.2.6p5-5.el6_7.4.x86_64.rpm ntpdate-4.2.6p5-5.el6_7.4.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
i386: ntp-debuginfo-4.2.6p5-5.el6_7.4.i686.rpm ntp-perl-4.2.6p5-5.el6_7.4.i686.rpm
noarch: ntp-doc-4.2.6p5-5.el6_7.4.noarch.rpm
ppc64: ntp-debuginfo-4.2.6p5-5.el6_7.4.ppc64.rpm ntp-perl-4.2.6p5-5.el6_7.4.ppc64.rpm
s390x: ntp-debuginfo-4.2.6p5-5.el6_7.4.s390x.rpm ntp-perl-4.2.6p5-5.el6_7.4.s390x.rpm
x86_64: ntp-debuginfo-4.2.6p5-5.el6_7.4.x86_64.rpm ntp-perl-4.2.6p5-5.el6_7.4.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: ntp-4.2.6p5-5.el6_7.4.src.rpm
i386: ntp-4.2.6p5-5.el6_7.4.i686.rpm ntp-debuginfo-4.2.6p5-5.el6_7.4.i686.rpm ntpdate-4.2.6p5-5.el6_7.4.i686.rpm
x86_64: ntp-4.2.6p5-5.el6_7.4.x86_64.rpm ntp-debuginfo-4.2.6p5-5.el6_7.4.x86_64.rpm ntpdate-4.2.6p5-5.el6_7.4.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
i386: ntp-debuginfo-4.2.6p5-5.el6_7.4.i686.rpm ntp-perl-4.2.6p5-5.el6_7.4.i686.rpm
noarch: ntp-doc-4.2.6p5-5.el6_7.4.noarch.rpm
x86_64: ntp-debuginfo-4.2.6p5-5.el6_7.4.x86_64.rpm ntp-perl-4.2.6p5-5.el6_7.4.x86_64.rpm
Red Hat Enterprise Linux Client (v. 7):
Source: ntp-4.2.6p5-22.el7_2.1.src.rpm
x86_64: ntp-4.2.6p5-22.el7_2.1.x86_64.rpm ntp-debuginfo-4.2.6p5-22.el7_2.1.x86_64.rpm ntpdate-4.2.6p5-22.el7_2.1.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
noarch: ntp-doc-4.2.6p5-22.el7_2.1.noarch.rpm ntp-perl-4.2.6p5-22.el7_2.1.noarch.rpm
x86_64: ntp-debuginfo-4.2.6p5-22.el7_2.1.x86_64.rpm sntp-4.2.6p5-22.el7_2.1.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: ntp-4.2.6p5-22.el7_2.1.src.rpm
x86_64: ntp-4.2.6p5-22.el7_2.1.x86_64.rpm ntp-debuginfo-4.2.6p5-22.el7_2.1.x86_64.rpm ntpdate-4.2.6p5-22.el7_2.1.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
noarch: ntp-doc-4.2.6p5-22.el7_2.1.noarch.rpm ntp-perl-4.2.6p5-22.el7_2.1.noarch.rpm
x86_64: ntp-debuginfo-4.2.6p5-22.el7_2.1.x86_64.rpm sntp-4.2.6p5-22.el7_2.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: ntp-4.2.6p5-22.el7_2.1.src.rpm
ppc64: ntp-4.2.6p5-22.el7_2.1.ppc64.rpm ntp-debuginfo-4.2.6p5-22.el7_2.1.ppc64.rpm ntpdate-4.2.6p5-22.el7_2.1.ppc64.rpm
ppc64le: ntp-4.2.6p5-22.el7_2.1.ppc64le.rpm ntp-debuginfo-4.2.6p5-22.el7_2.1.ppc64le.rpm ntpdate-4.2.6p5-22.el7_2.1.ppc64le.rpm
s390x: ntp-4.2.6p5-22.el7_2.1.s390x.rpm ntp-debuginfo-4.2.6p5-22.el7_2.1.s390x.rpm ntpdate-4.2.6p5-22.el7_2.1.s390x.rpm
x86_64: ntp-4.2.6p5-22.el7_2.1.x86_64.rpm ntp-debuginfo-4.2.6p5-22.el7_2.1.x86_64.rpm ntpdate-4.2.6p5-22.el7_2.1.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
noarch: ntp-doc-4.2.6p5-22.el7_2.1.noarch.rpm ntp-perl-4.2.6p5-22.el7_2.1.noarch.rpm
ppc64: ntp-debuginfo-4.2.6p5-22.el7_2.1.ppc64.rpm sntp-4.2.6p5-22.el7_2.1.ppc64.rpm
ppc64le: ntp-debuginfo-4.2.6p5-22.el7_2.1.ppc64le.rpm sntp-4.2.6p5-22.el7_2.1.ppc64le.rpm
s390x: ntp-debuginfo-4.2.6p5-22.el7_2.1.s390x.rpm sntp-4.2.6p5-22.el7_2.1.s390x.rpm
x86_64: ntp-debuginfo-4.2.6p5-22.el7_2.1.x86_64.rpm sntp-4.2.6p5-22.el7_2.1.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: ntp-4.2.6p5-22.el7_2.1.src.rpm
x86_64: ntp-4.2.6p5-22.el7_2.1.x86_64.rpm ntp-debuginfo-4.2.6p5-22.el7_2.1.x86_64.rpm ntpdate-4.2.6p5-22.el7_2.1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
noarch: ntp-doc-4.2.6p5-22.el7_2.1.noarch.rpm ntp-perl-4.2.6p5-22.el7_2.1.noarch.rpm
x86_64: ntp-debuginfo-4.2.6p5-22.el7_2.1.x86_64.rpm sntp-4.2.6p5-22.el7_2.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2015-8138 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFWpijmXlSAg2UNWIIRAlKDAJ9cuPIz/2ne6I5rsDoKlg2rFxFKlQCbBhEi h+3u/C5uuGO6PsIJukpD32I= =Osu4 -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce .
References:
- CVE-2015-7973 - ntp
- CVE-2015-7974 - ntp
- CVE-2015-7975 - ntp
- CVE-2015-7979 - ntp
- CVE-2015-8138 - ntp
- CVE-2015-8158 - ntp
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
CVE-2016-2518
Yihan Lian discovered that an OOB memory access could potentially
crash ntpd.
For the stable distribution (jessie), these problems have been fixed in version 1:4.2.6.p5+dfsg-7+deb8u2.
For the testing distribution (stretch), these problems have been fixed in version 1:4.2.8p7+dfsg-1.
For the unstable distribution (sid), these problems have been fixed in version 1:4.2.8p7+dfsg-1.
We recommend that you upgrade your ntp packages. Corrected: 2016-01-22 15:55:21 UTC (stable/10, 10.2-STABLE) 2016-01-27 07:41:31 UTC (releng/10.2, 10.2-RELEASE-p11) 2016-01-27 07:41:31 UTC (releng/10.1, 10.1-RELEASE-p28) 2016-01-22 15:56:35 UTC (stable/9, 9.3-STABLE) 2016-01-27 07:42:11 UTC (releng/9.3, 9.3-RELEASE-p35) CVE Name: CVE-2015-7973, CVE-2015-7974, CVE-2015-7975, CVE-2015-7976, CVE-2015-7977, CVE-2015-7978, CVE-2015-7979, CVE-2015-8138, CVE-2015-8139, CVE-2015-8140, CVE-2015-8158
For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit .
II. Problem Description
Multiple vulnerabilities have been discovered in ntp 4.2.8p5:
Potential Infinite Loop in ntpq. [CVE-2015-8138]
Off-path Denial of Service (DoS) attack on authenticated broadcast mode. [CVE-2015-7979]
Stack exhaustion in recursive traversal of restriction list. [CVE-2015-7978]
reslist NULL pointer dereference. [CVE-2015-7977]
ntpq saveconfig command allows dangerous characters in filenames. [CVE-2015-7976]
nextvar() missing length check. [CVE-2015-7975]
Skeleton Key: Missing key check allows impersonation between authenticated peers. [CVE-2015-7974]
Deja Vu: Replay attack on authenticated broadcast mode. [CVE-2015-7973]
ntpq vulnerable to replay attacks. [CVE-2015-8140]
Origin Leak: ntpq and ntpdc, disclose origin. [CVE-2015-8139]
III. Impact
A malicious NTP server, or an attacker who can conduct MITM attack by intercepting NTP query traffic, may be able to cause a ntpq client to infinitely loop. [CVE-2015-8158]
A malicious NTP server, or an attacker who can conduct MITM attack by intercepting NTP query traffic, may be able to prevent a ntpd(8) daemon to distinguish between legitimate peer responses from forgeries. This can partially be mitigated by configuring multiple time sources. [CVE-2015-8138]
An off-path attacker who can send broadcast packets with bad authentication (wrong key, mismatched key, incorrect MAC, etc) to broadcast clients can cause these clients to tear down associations. [CVE-2015-7979]
An attacker who can send unauthenticated 'reslist' command to a NTP server may cause it to crash, resulting in a denial of service condition due to stack exhaustion [CVE-2015-7978] or a NULL pointer dereference [CVE-2015-7977].
An attacker who can send 'modify' requests to a NTP server may be able to create file that contain dangerous characters in their name, which could cause dangerous behavior in a later shell invocation. [CVE-2015-7976]
A remote attacker may be able to crash a ntpq client. [CVE-2015-7975]
A malicious server which holds a trusted key may be able to impersonate other trusted servers in an authenticated configuration. [CVE-2015-7974]
A man-in-the-middle attacker or a malicious participant that has the same trusted keys as the victim can replay time packets if the NTP network is configured for broadcast operations. [CVE-2015-7973]
The ntpq protocol is vulnerable to replay attacks which may be used to e.g. re-establish an association to malicious server. [CVE-2015-8140]
An attacker who can intercept NTP traffic can easily forge live server responses. [CVE-2015-8139]
IV. Workaround
No workaround is available, but systems not running ntpd(8) are not affected. Network administrators are advised to implement BCP-38, which helps to reduce risk associated with the attacks.
V. Solution
Perform one of the following:
1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date. A reboot is recommended but not required.
2) To update your vulnerable system via a binary patch:
Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility:
freebsd-update fetch
freebsd-update install
The ntpd service has to be restarted after the update. A reboot is recommended but not required.
3) To update your vulnerable system via a source code patch:
The following patches have been verified to apply to the applicable FreeBSD release branches.
a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.
fetch https://security.FreeBSD.org/patches/SA-16:09/ntp.patch
fetch https://security.FreeBSD.org/patches/SA-16:09/ntp.patch.asc
gpg --verify ntp.patch.asc
b) Apply the patch. Execute the following commands as root:
cd /usr/src
patch < /path/to/patch
c) Recompile the operating system using buildworld and installworld as described in .
Restart the applicable daemons, or reboot the system.
VI. Correction details
The following list contains the correction revision numbers for each affected branch.
Branch/path Revision
stable/9/ r294570 releng/9.3/ r294905 stable/10/ r294569 releng/10.1/ r294904 releng/10.2/ r294904
To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed:
svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
Or visit the following URL, replacing NNNNNN with the revision number:
VII
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201701-1135", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ntp", "scope": "eq", "trust": 1.9, "vendor": "ntp", "version": "4.3.25" }, { "model": "ntp", "scope": "eq", "trust": 1.6, "vendor": "ntp", "version": "4.3.22" }, { "model": "ntp", "scope": "eq", "trust": 1.6, "vendor": "ntp", "version": "4.3.29" }, { "model": "ntp", "scope": "eq", "trust": 1.6, "vendor": "ntp", "version": "4.3.20" }, { "model": "ntp", "scope": "eq", "trust": 1.6, "vendor": "ntp", "version": "4.3.23" }, { "model": "ntp", "scope": "eq", "trust": 1.6, "vendor": "ntp", "version": "4.3.21" }, { "model": "ntp", "scope": "eq", "trust": 1.6, "vendor": "ntp", "version": "4.3.24" }, { "model": "ntp", "scope": "eq", "trust": 1.6, "vendor": "ntp", "version": "4.3.26" }, { "model": "ntp", "scope": "eq", "trust": 1.6, "vendor": "ntp", "version": "4.3.27" }, { "model": "ntp", "scope": "eq", "trust": 1.6, "vendor": "ntp", "version": "4.3.28" }, { "model": "ntp", "scope": "eq", "trust": 1.3, "vendor": "ntp", "version": "4.3.77" }, { "model": "ntp", "scope": "eq", "trust": 1.3, "vendor": "ntp", "version": "4.3.70" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.87" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.14" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.67" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.58" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.36" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.84" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.81" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.10" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.65" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.42" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.64" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.75" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.17" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.80" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.78" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.66" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.85" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.1" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.50" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.72" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.39" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.18" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.82" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.62" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.73" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.49" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.86" }, { "model": "ntp", "scope": "lte", "trust": 1.0, "vendor": "ntp", "version": "4.2.8" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.55" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.60" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.44" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.30" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.57" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.79" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.15" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.43" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.8" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.13" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.76" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.35" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.52" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.12" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.0" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.69" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.53" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.19" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.54" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.46" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.56" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.48" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.61" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.89" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.7" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.38" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.68" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.16" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.45" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.47" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.32" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.37" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.3" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.33" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.83" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.4" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.74" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.71" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.41" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.31" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.88" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.6" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.5" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.40" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.11" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.59" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.34" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.51" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.63" }, { "model": "ntp", "scope": "eq", "trust": 1.0, "vendor": "ntp", "version": "4.3.2" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ntp", "version": null }, { "model": "ntp", "scope": "eq", "trust": 0.8, "vendor": "ntp", "version": "4.2.8p6" }, { "model": "ntp", "scope": "lt", "trust": 0.8, "vendor": "ntp", "version": "4.3.x" }, { "model": "ntp", "scope": "eq", "trust": 0.8, "vendor": "ntp", "version": null }, { "model": "ntp", "scope": "eq", "trust": 0.8, "vendor": "ntp", "version": "4.3.90" }, { "model": "junos 15.1f6-s4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3.0.0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "10.2-release-p8", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.211" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7" }, { "model": "nexus series switches", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "90000" }, { "model": "junos 14.2r7-s6", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.5" }, { "model": "junos 14.1r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.1" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "4.2.8p6", "scope": "ne", "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "junos 14.1r8-s3", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "smartcloud entry appliance fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.24" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.0.0" }, { "model": "10.1-release-p26", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "edge digital media player", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3400" }, { "model": "junos 15.1f3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "small business series wireless access points", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3210" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.3" }, { "model": "p7-rc2", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.4" }, { "model": "jabber guest", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.0(2)" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.219" }, { "model": "10.1-release-p5", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "junos 14.2r7", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "smartcloud entry appliance fi", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.4" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.2" }, { "model": "real-time compression appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.2" }, { "model": "prime license manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "junos 14.1r8", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 16.2r1-s3", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.2r8", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "visual quality experience server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "9.3-release-p22", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.22" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.4.0" }, { "model": "junos 14.1r3-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "prime collaboration assurance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ntp", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.7" }, { "model": "9.3-release-p10", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.3-release-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "prime infrastructure standalone plug and play gateway", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "junos 14.1r4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.4" }, { "model": "4.2.8p3", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "junos 12.3x48-d15", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "prime access registrar appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "scos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "junos 14.1r4-s7", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "10.1-release-p17", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "junos 14.2r4-s1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3x48-d55", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1r5-s2", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "integrated management module ii for flex systems 1aoo74f-5.80", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "junos 15.1r6", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1f2-s16", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "smartcloud entry appliance fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.44" }, { "model": "ntp", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.6" }, { "model": "10.2-release-p11", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "clean access manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "common services platform collector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "10.2-release-p9", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-release-p27", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "junos 16.1r3-s3", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "media experience engines", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "wap371 wireless access point", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.2" }, { "model": "p1", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.2" }, { "model": "10.2-release-p6", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "mediasense", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "junos 17.1r1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x53-d70", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.2r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 16.2r2", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.42" }, { "model": "junos 14.1r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 16.1r4-s1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "show and share", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "sentinel", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ucs director", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "telepresence isdn link", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "physical access manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.08" }, { "model": "junos 12.3x48-d30", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "communications session border controller", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7.2.0" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.0.4" }, { "model": "nac guest server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "enterprise content delivery system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1" }, { "model": "junos 14.2r6.5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.08" }, { "model": "10.2-release-p10", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.0.3" }, { "model": "video delivery system recorder", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.213" }, { "model": "ntpd", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.3" }, { "model": "communications session border controller", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7.3.0" }, { "model": "websphere datapower xc10 appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5" }, { "model": "integrated management module ii for flex systems 1aoo", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "4.2.5p186", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "9.3-release-p2", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "smartcloud entry appliance fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.22" }, { "model": "9.3-stable", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-release-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "digital media manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "10.1-release-p9", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.1" }, { "model": "4.2.5p3", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "smartcloud entry appliance fixpac", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.1" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.2" }, { "model": "flex system fc3171 8gb san switch and san pass-thru", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.0.00" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.1" }, { "model": "smartcloud entry appliance fix pack", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "2.46" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.5" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.3" }, { "model": "unity express", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry appliance fix pack", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "2.26" }, { "model": "junos 15.1r4-s7", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "4.2.8p5", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "telepresence exchange system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7" }, { "model": "4.2.7p111", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "9.3-release-p3", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.32" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.3" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.2" }, { "model": "hosted collaboration mediation fulfillment", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.0" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "smartcloud entry appliance fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.34" }, { "model": "junos 15.1f2-s5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "intrusion prevention system solutions", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "prime access registrar", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "onepk all-in-one vm", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "integrated management module ii for system 1aoo", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "x" }, { "model": "junos 15.1f5-s7", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.0" }, { "model": "junos 12.3x48-d35", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "9.3-release-p25", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "ntp", "scope": "ne", "trust": 0.3, "vendor": "ntp", "version": "4.3.90" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.1" }, { "model": "series ip phones vpn feature", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8800-0" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.21" }, { "model": "small business series wireless access points", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1210" }, { "model": "industrial router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9100" }, { "model": "junos 14.2r5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 17.2r", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "smartcloud entry fixpack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.0.33" }, { "model": "10.1-release-p28", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.2" }, { "model": "video distribution suite for internet streaming", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.31" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.218" }, { "model": "websphere datapower xc10 appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "4.2.7p366", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.20" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "p4", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.4" }, { "model": "junos 14.2r6-s4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "linux x86 64 -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.0" }, { "model": "junos 14.2r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.3" }, { "model": "junos 14.2r6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "dcm series 9900-digital content manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "9.3" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.0" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.214" }, { "model": "9.3-release-p21", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "junos 12.3x48-d40", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "smartcloud entry fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.19" }, { "model": "junos 12.3x48-d50", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "9.3-release-p24", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.3-release-p35", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "junos 15.1f7", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.4" }, { "model": "10.1-release-p19", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "smartcloud entry appliance fixpac", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2" }, { "model": "integrated management module ii for bladecenter 1aoo74f-5.80", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "flex system fc3171 8gb san switch and san pass-thru", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.1.8.01.00" }, { "model": "p153", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.5" }, { "model": "9.3-release-p13", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.113" }, { "model": "network device security assessment", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.0.4" }, { "model": "junos 14.1r6-s1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "integrated management module ii for bladecenter 1aoo", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "smartcloud entry appliance fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.11" }, { "model": "asa cx and cisco prime security manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "junos 12.3x48-d45", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1f4-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.110" }, { "model": "standalone rack server cimc", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.0.0" }, { "model": "9.3-release-p33", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.37" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "10.2" }, { "model": "junos 15.1f5-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "smartcloud entry appliance fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.21" }, { "model": "junos 15.1x53-d64", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "smartcloud entry appliance fix pack", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "2.36" }, { "model": "telepresence video communication server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "junos 16.1r5", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "telepresence sx series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "10.1-release-p25", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "junos 14.2r3-s4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1f6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "14.04" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "meetingplace", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "qlogic virtual fabric extension module for ibm bladecenter", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.0.3.16.00" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.0.3" }, { "model": "unified computing system e-series blade server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.0" }, { "model": "junos 14.2r2.8", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1f1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "p74", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.5" }, { "model": "expressway series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.4" }, { "model": "ntp", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.8" }, { "model": "integrated management module ii for system 1aoo74f-5.80", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "x" }, { "model": "4.2.8p2", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "10.1-release-p6", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "junos 15.1f5-s5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "edge digital media player", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3000" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2" }, { "model": "smartcloud entry appliance fi", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.0.4" }, { "model": "management heartbeat server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.09" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.0" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.4" }, { "model": "real-time compression appliance", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "4.1.17" }, { "model": "p6", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.4" }, { "model": "connected grid routers", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "junos 12.3x48-d10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "telepresence integrator c series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.2" }, { "model": "p7", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.4" }, { "model": "4.2.0.a", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "nac server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.3" }, { "model": "smartcloud entry appliance fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.12" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.1" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.01" }, { "model": "junos 14.1r6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "ntp", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.1.2" }, { "model": "nac appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "p5", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.4" }, { "model": "9.3-release-p31", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "smartcloud entry appliance fixpac", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.2" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.3" }, { "model": "junos 12.3x48-d30.7", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.0" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.09" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.02" }, { "model": "application policy infrastructure controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "network analysis module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "junos 14.1r3-s9", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "4.2.8p4", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "prime infrastructure", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1.0.0" }, { "model": "identity services engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "junos 17.2r1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "telepresence ex series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "qlogic virtual fabric extension module for ibm bladecenter", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "4.2.7p11", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "smartcloud entry jre update", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.0.34" }, { "model": "junos 15.1f2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "unified communications manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.37" }, { "model": "p150", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.5" }, { "model": "junos 15.1f2-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1x49-d80", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "10.2-stable", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "junos 14.1r5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1f5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "9.3-release-p5", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.010" }, { "model": "linux -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.1" }, { "model": "telepresence conductor", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry appliance fixpac", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "security access manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.0" }, { "model": "content security appliance updater servers", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "centos", "scope": "eq", "trust": 0.3, "vendor": "centos", "version": "6" }, { "model": "p8", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.4" }, { "model": "10.1-release-p23", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "junos 12.3x48-d25", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "10.1-release-p16", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "unified communications manager session management edition", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "junos 14.1r9", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "9.3-release-p6", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "support central", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "9.3-release-p9", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "junos 15.1f4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1r7", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "small business series wireless access points", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5000" }, { "model": "virtual security gateway for microsoft hyper-v", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "junos 15.1f6-s5", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "p4", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.2" }, { "model": "junos 15.1x53-d231", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "prime service catalog virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "junos 12.3x48-d20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "access registrar appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "junos 14.2r4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "videoscape control suite", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "9.3-release-p34", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "junos 15.1f2-s14", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "telepresence mx series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "junos 14.2r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "ucs central", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "telepresence profile series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "visual quality experience tools server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "4.2.8p1", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.4" }, { "model": "emergency responder", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "qlogic 8gb intelligent pass-thru module and san switch module", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.10.1.38.00" }, { "model": "im and presence service", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "9.3-release-p29", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "smartcloud entry appliance fi", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.0.4" }, { "model": "cloud object store", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "qlogic 8gb intelligent pass-thru module and san switch module", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.10" } ], "sources": [ { "db": "CERT/CC", "id": "VU#718152" }, { "db": "BID", "id": "81811" }, { "db": "JVNDB", "id": "JVNDB-2015-007359" }, { "db": "CNNVD", "id": "CNNVD-201601-668" }, { "db": "NVD", "id": "CVE-2015-8138" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Siemens reported these vulnerabilities to CISA.", "sources": [ { "db": "CNNVD", "id": "CNNVD-201601-668" } ], "trust": 0.6 }, "cve": "CVE-2015-8138", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2015-8138", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2015-8138", "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2015-8138", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2015-8138", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201601-668", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2015-8138", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2015-8138" }, { "db": "JVNDB", "id": "JVNDB-2015-007359" }, { "db": "CNNVD", "id": "CNNVD-201601-668" }, { "db": "NVD", "id": "CVE-2015-8138" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero. The NTP.org reference implementation of ntpd contains multiple vulnerabilities. NTP is prone to a denial-of-service vulnerability. \nSuccessful exploits may allow the attacker to cause a denial-of-service condition. ==========================================================================\nUbuntu Security Notice USN-3096-1\nOctober 05, 2016\n\nntp vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 16.04 LTS\n- Ubuntu 14.04 LTS\n- Ubuntu 12.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in NTP. A remote attacker could use this issue to perform a replay\nattack. (CVE-2015-7973)\n\nMatt Street discovered that NTP incorrectly verified peer associations of\nsymmetric keys. A remote attacker could use this issue to perform an\nimpersonation attack. (CVE-2015-7974)\n\nJonathan Gardner discovered that the NTP ntpq utility incorrectly handled\nmemory. This issue only affected Ubuntu 16.04\nLTS. An attacker could possibly use this\nissue to overwrite arbitrary files. (CVE-2015-7976)\n\nStephen Gray discovered that NTP incorrectly handled large restrict lists. A remote attacker could use this issue to spoof peer servers. \n(CVE-2015-8138)\n\nJonathan Gardner discovered that the NTP ntpq utility did not properly\nhandle certain incorrect values. (CVE-2015-8158)\n\nIt was discovered that the NTP cronjob incorrectly cleaned up the\nstatistics directory. A local attacker could possibly use this to escalate\nprivileges. (CVE-2016-0727)\n\nStephen Gray and Matthew Van Gundy discovered that NTP incorrectly\nvalidated crypto-NAKs. A remote attacker could possibly use this issue to\nprevent clients from synchronizing. (CVE-2016-1547)\n\nMiroslav Lichvar and Jonathan Gardner discovered that NTP incorrectly\nhandled switching to interleaved symmetric mode. A remote attacker could\npossibly use this issue to prevent clients from synchronizing. \n(CVE-2016-1548)\n\nMatthew Van Gundy, Stephen Gray and Loganaden Velvindron discovered that\nNTP incorrectly handled message authentication. A remote attacker could\npossibly use this issue to recover the message digest key. (CVE-2016-1550)\n\nYihan Lian discovered that NTP incorrectly handled duplicate IPs on\nunconfig directives. \n(CVE-2016-2516)\n\nYihan Lian discovered that NTP incorrectly handled certail peer\nassociations. A remote attacker could possibly use this issue to cause a denial\nof service. A remote attacker could possibly use this issue to\ncause a denial of service. A remote attacker could possibly use this issue to\ncause a denial of service. (CVE-2016-4956)\n\nIn the default installation, attackers would be isolated by the NTP\nAppArmor profile. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 16.04 LTS:\n ntp 1:4.2.8p4+dfsg-3ubuntu5.3\n\nUbuntu 14.04 LTS:\n ntp 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10\n\nUbuntu 12.04 LTS:\n ntp 1:4.2.6.p3+dfsg-1ubuntu3.11\n\nIn general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03750en_us\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: hpesbhf03750en_us\nVersion: 1\n\nHPESBHF03750 rev.1 - HPE Network Products including Comware 5, Comware 7 and\nVCX running NTP, Remote Denial of Service (DoS), Unauthorized Modification,\nLocal Denial of Service (DoS)\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2017-05-25\nLast Updated: 2017-05-25\n\nPotential Security Impact: Local: Denial of Service (DoS); Remote: Denial of\nService (DoS), Unauthorized Modification\n\nSource: Hewlett Packard Enterprise, Product Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities with NTP have been addressed for HPE\nnetwork products including Comware 5, Comware 7 and VCX. \n\n - Comware v5 (CW5) Products All versions - Please refer to the RESOLUTION\nbelow for a list of updated products. \n - Comware v7 (CW7) Products All versions - Please refer to the RESOLUTION\nbelow for a list of updated products. \n - VCX Products All versions - Please refer to the RESOLUTION below for a\nlist of updated products. \n\nBACKGROUND\n\n CVSS Base Metrics\n =================\n Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector\n\n CVE-2015-7973\n 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L\n 5.8 (AV:N/AC:M/Au:N/C:N/I:P/A:P)\n\n CVE-2015-7974\n 3.1 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N\n 2.1 (AV:N/AC:H/Au:S/C:N/I:P/A:N)\n\n CVE-2015-7975\n 4.0 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n 2.1 (AV:L/AC:L/Au:N/C:N/I:N/A:P)\n\n CVE-2015-7979\n 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)\n\n CVE-2015-8138\n 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\n 5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)\n\n CVE-2015-8158\n 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\n 4.3 (AV:N/AC:M/Au:N/C:N/I:N/A:P)\n\n Information on CVSS is documented in\n HPE Customer Notice HPSN-2008-002 here:\n\nhttps://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499\n\nRESOLUTION\n\nHPE has made the following software updates available to resolve the\nvulnerabilities in the Comware and VCX products running NTP. \n\n**COMWARE 5 Products**\n\n + A6600 (Comware 5) - Version: R3303P31\n * HP Network Products\n - JC165A HP 6600 RPE-X1 Router Module\n - JC177A HP 6608 Router\n - JC177B HP 6608 Router Chassis\n - JC178A HP 6604 Router Chassis\n - JC178B HP 6604 Router Chassis\n - JC496A HP 6616 Router Chassis\n - JC566A HP 6600 RSE-X1 Router Main Processing Unit\n - JG780A HP 6600 RSE-X1 TAA-compliant Main Processing Unit\n - JG781A HP 6600 RPE-X1 TAA-compliant Main Processing Unit\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + HSR6602 (Comware 5) - Version: R3303P31\n * HP Network Products\n - JC176A HP 6602 Router Chassis\n - JG353A HP HSR6602-G Router\n - JG354A HP HSR6602-XG Router\n - JG355A HP 6600 MCP-X1 Router Main Processing Unit\n - JG356A HP 6600 MCP-X2 Router Main Processing Unit\n - JG776A HP HSR6602-G TAA-compliant Router\n - JG777A HP HSR6602-XG TAA-compliant Router\n - JG778A HP 6600 MCP-X2 Router TAA-compliant Main Processing Unit\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + HSR6800 (Comware 5) - Version: R3303P31\n * HP Network Products\n - JG361A HP HSR6802 Router Chassis\n - JG361B HP HSR6802 Router Chassis\n - JG362A HP HSR6804 Router Chassis\n - JG362B HP HSR6804 Router Chassis\n - JG363A HP HSR6808 Router Chassis\n - JG363B HP HSR6808 Router Chassis\n - JG364A HP HSR6800 RSE-X2 Router Main Processing Unit\n - JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing Unit\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + MSR20 (Comware 5) - Version: R2516P06\n * HP Network Products\n - JD432A HP A-MSR20-21 Router\n - JD662A HP MSR20-20 Router\n - JD663A HP A-MSR20-21 Router\n - JD663B HP MSR20-21 Router\n - JD664A HP MSR20-40 Router\n - JF228A HP MSR20-40 Router\n - JF283A HP MSR20-20 Router\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + MSR20-1X (Comware 5) - Version: R2516P06\n * HP Network Products\n - JD431A HP MSR20-10 Router\n - JD667A HP MSR20-15 IW Multi-Service Router\n - JD668A HP MSR20-13 Multi-Service Router\n - JD669A HP MSR20-13 W Multi-Service Router\n - JD670A HP MSR20-15 A Multi-Service Router\n - JD671A HP MSR20-15 AW Multi-Service Router\n - JD672A HP MSR20-15 I Multi-Service Router\n - JD673A HP MSR20-11 Multi-Service Router\n - JD674A HP MSR20-12 Multi-Service Router\n - JD675A HP MSR20-12 W Multi-Service Router\n - JD676A HP MSR20-12 T1 Multi-Service Router\n - JF236A HP MSR20-15-I Router\n - JF237A HP MSR20-15-A Router\n - JF238A HP MSR20-15-I-W Router\n - JF239A HP MSR20-11 Router\n - JF240A HP MSR20-13 Router\n - JF241A HP MSR20-12 Router\n - JF806A HP MSR20-12-T Router\n - JF807A HP MSR20-12-W Router\n - JF808A HP MSR20-13-W Router\n - JF809A HP MSR20-15-A-W Router\n - JF817A HP MSR20-15 Router\n - JG209A HP MSR20-12-T-W Router (NA)\n - JG210A HP MSR20-13-W Router (NA)\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + MSR 30 (Comware 5) - Version: R2516\n * HP Network Products\n - JD654A HP MSR30-60 POE Multi-Service Router\n - JD657A HP MSR30-40 Multi-Service Router\n - JD658A HP MSR30-60 Multi-Service Router\n - JD660A HP MSR30-20 POE Multi-Service Router\n - JD661A HP MSR30-40 POE Multi-Service Router\n - JD666A HP MSR30-20 Multi-Service Router\n - JF229A HP MSR30-40 Router\n - JF230A HP MSR30-60 Router\n - JF232A HP RTMSR3040-AC-OVSAS-H3\n - JF235A HP MSR30-20 DC Router\n - JF284A HP MSR30-20 Router\n - JF287A HP MSR30-40 DC Router\n - JF801A HP MSR30-60 DC Router\n - JF802A HP MSR30-20 PoE Router\n - JF803A HP MSR30-40 PoE Router\n - JF804A HP MSR30-60 PoE Router\n - JG728A HP MSR30-20 TAA-compliant DC Router\n - JG729A HP MSR30-20 TAA-compliant Router\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + MSR 30-16 (Comware 5) - Version: R2516P06\n * HP Network Products\n - JD659A HP MSR30-16 POE Multi-Service Router\n - JD665A HP MSR30-16 Multi-Service Router\n - JF233A HP MSR30-16 Router\n - JF234A HP MSR30-16 PoE Router,\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + MSR 30-1X (Comware 5) - Version: R2516P06\n * HP Network Products\n - JF800A HP MSR30-11 Router\n - JF816A HP MSR30-10 2 FE /2 SIC /1 MIM MS Rtr\n - JG182A HP MSR30-11E Router\n - JG183A HP MSR30-11F Router\n - JG184A HP MSR30-10 DC Router\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + MSR 50 (Comware 5) - Version: R2516P06\n * HP Network Products\n - JD433A HP MSR50-40 Router\n - JD653A HP MSR50 Processor Module\n - JD655A HP MSR50-40 Multi-Service Router\n - JD656A HP MSR50-60 Multi-Service Router\n - JF231A HP MSR50-60 Router\n - JF285A HP MSR50-40 DC Router\n - JF640A HP MSR50-60 Rtr Chassis w DC PwrSupply\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + MSR 50-G2 (Comware 5) - Version: R2516P06\n * HP Network Products\n - JD429A HP MSR50 G2 Processor Module\n - JD429B HP MSR50 G2 Processor Module\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + MSR 9XX (Comware 5) - Version: R2516P06\n * HP Network Products\n - JF812A HP MSR900 Router\n - JF813A HP MSR920 Router\n - JF814A HP MSR900-W Router\n - JF815A HP MSR920 2FEWAN/8FELAN/.11 b/g Rtr\n - JG207A HP MSR900-W Router (NA)\n - JG208A HP MSR920-W Router (NA)\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + MSR 93X (Comware 5) - Version: R2516P06\n * HP Network Products\n - JG511A HP MSR930 Router\n - JG511B HP MSR930 Router\n - JG512A HP MSR930 Wireless Router\n - JG513A HP MSR930 3G Router\n - JG513B HP MSR930 3G Router\n - JG514A HP MSR931 Router\n - JG514B HP MSR931 Router\n - JG515A HP MSR931 3G Router\n - JG516A HP MSR933 Router\n - JG517A HP MSR933 3G Router\n - JG518A HP MSR935 Router\n - JG518B HP MSR935 Router\n - JG519A HP MSR935 Wireless Router\n - JG520A HP MSR935 3G Router\n - JG531A HP MSR931 Dual 3G Router\n - JG531B HP MSR931 Dual 3G Router\n - JG596A HP MSR930 4G LTE/3G CDMA Router\n - JG597A HP MSR936 Wireless Router\n - JG665A HP MSR930 4G LTE/3G WCDMA Global Router\n - JG704A HP MSR930 4G LTE/3G WCDMA ATT Router\n - JH009A HP MSR931 Serial (TI) Router\n - JH010A HP MSR933 G.SHDSL (TI) Router\n - JH011A HP MSR935 ADSL2+ (TI) Router\n - JH012A HP MSR930 Wireless 802.11n (NA) Router\n - JH012B HP MSR930 Wireless 802.11n (NA) Router\n - JH013A HP MSR935 Wireless 802.11n (NA) Router\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + MSR1000 (Comware 5) - Version: R2516P06\n * HP Network Products\n - JG732A HP MSR1003-8 AC Router\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + 12500 (Comware 5) - Version: R1829P03\n * HP Network Products\n - JC072B HP 12500 Main Processing Unit\n - JC085A HP A12518 Switch Chassis\n - JC086A HP A12508 Switch Chassis\n - JC652A HP 12508 DC Switch Chassis\n - JC653A HP 12518 DC Switch Chassis\n - JC654A HP 12504 AC Switch Chassis\n - JC655A HP 12504 DC Switch Chassis\n - JC808A HP 12500 TAA Main Processing Unit\n - JF430A HP A12518 Switch Chassis\n - JF430B HP 12518 Switch Chassis\n - JF430C HP 12518 AC Switch Chassis\n - JF431A HP A12508 Switch Chassis\n - JF431B HP 12508 Switch Chassis\n - JF431C HP 12508 AC Switch Chassis\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + 9500E (Comware 5) - Version: R1829P03\n * HP Network Products\n - JC124A HP A9508 Switch Chassis\n - JC124B HP 9505 Switch Chassis\n - JC125A HP A9512 Switch Chassis\n - JC125B HP 9512 Switch Chassis\n - JC474A HP A9508-V Switch Chassis\n - JC474B HP 9508-V Switch Chassis\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + 10500 (Comware 5) - Version: R1210P03\n * HP Network Products\n - JC611A HP 10508-V Switch Chassis\n - JC612A HP 10508 Switch Chassis\n - JC613A HP 10504 Switch Chassis\n - JC614A HP 10500 Main Processing Unit\n - JC748A HP 10512 Switch Chassis\n - JG375A HP 10500 TAA-compliant Main Processing Unit\n - JG820A HP 10504 TAA-compliant Switch Chassis\n - JG821A HP 10508 TAA-compliant Switch Chassis\n - JG822A HP 10508-V TAA-compliant Switch Chassis\n - JG823A HP 10512 TAA-compliant Switch Chassis\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + 7500 (Comware 5) - Version: R6710P03\n * HP Network Products\n - JC666A HP 7503-S 144Gbps Fabric/MPU with PoE Upgradable 20-port\nGig-T/4-port GbE Combo\n - JC697A HP 7502 TAA-compliant Main Processing Unit\n - JC698A HP 7503-S 144Gbps TAA Fabric / MPU with 16 GbE SFP Ports and 8\nGbE Combo Ports\n - JC699A HP 7500 384Gbps TAA-compliant Fabric / MPU with 2 10GbE XFP\nPorts\n - JC700A HP 7500 384Gbps TAA-compliant Fabric / Main Processing Unit\n - JC701A HP 7500 768Gbps TAA-compliant Fabric / Main Processing Unit\n - JD193A HP 7500 384Gbps Fabric Module with 2 XFP Ports\n - JD193B HP 7500 384Gbps Fabric Module with 2 XFP Ports\n - JD194A HP 7500 384Gbps Fabric Module\n - JD194B HP 7500 384Gbps Fabric Module\n - JD195A HP 7500 384Gbps Advanced Fabric Module\n - JD196A HP 7502 Fabric Module\n - JD220A HP 7500 768Gbps Fabric Module\n - JD224A HP 7500 384Gbps Fabric Module with 12 SFP Ports\n - JD238A HP 7510 Switch Chassis\n - JD238B HP 7510 Switch Chassis\n - JD239A HP 7506 Switch Chassis\n - JD239B HP 7506 Switch Chassis\n - JD240A HP 7503 Switch Chassis\n - JD240B HP 7503 Switch Chassis\n - JD241A HP 7506-V Switch Chassis\n - JD241B HP 7506-V Switch Chassis\n - JD242A HP 7502 Switch Chassis\n - JD242B HP 7502 Switch Chassis\n - JD243A HP 7503-S Switch Chassis with 1 Fabric Slot\n - JD243B HP 7503-S Switch Chassis with 1 Fabric Slot\n - JE164A HP E7902 Switch Chassis\n - JE165A HP E7903 Switch Chassis\n - JE166A HP E7903 1 Fabric Slot Switch Chassis\n - JE167A HP E7906 Switch Chassis\n - JE168A HP E7906 Vertical Switch Chassis\n - JE169A HP E7910 Switch Chassis\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + 6125G/XG Blade Switch - Version: R2112P06\n * HP Network Products\n - 737220-B21 HP 6125G Blade Switch with TAA\n - 737226-B21 HP 6125G/XG Blade Switch with TAA\n - 658250-B21 HP 6125G/XG Blade Switch Opt Kit\n - 658247-B21 HP 6125G Blade Switch Opt Kit\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + 5800 (Comware 5) - Version: R1810P07\n * HP Network Products\n - JC099A HP 5800-24G-PoE Switch\n - JC099B HP 5800-24G-PoE+ Switch\n - JC100A HP 5800-24G Switch\n - JC100B HP 5800-24G Switch\n - JC101A HP 5800-48G Switch with 2 Slots\n - JC101B HP 5800-48G-PoE+ Switch with 2 Interface Slots\n - JC103A HP 5800-24G-SFP Switch\n - JC103B HP 5800-24G-SFP Switch with 1 Interface Slot\n - JC104A HP 5800-48G-PoE Switch\n - JC104B HP 5800-48G-PoE+ Switch with 1 Interface Slot\n - JC105A HP 5800-48G Switch\n - JC105B HP 5800-48G Switch with 1 Interface Slot\n - JG254A HP 5800-24G-PoE+ TAA-compliant Switch\n - JG254B HP 5800-24G-PoE+ TAA-compliant Switch\n - JG255A HP 5800-24G TAA-compliant Switch\n - JG255B HP 5800-24G TAA-compliant Switch\n - JG256A HP 5800-24G-SFP TAA-compliant Switch with 1 Interface Slot\n - JG256B HP 5800-24G-SFP TAA-compliant Switch with 1 Interface Slot\n - JG257A HP 5800-48G-PoE+ TAA-compliant Switch with 1 Interface Slot\n - JG257B HP 5800-48G-PoE+ TAA-compliant Switch with 1 Interface Slot\n - JG258A HP 5800-48G TAA-compliant Switch with 1 Interface Slot\n - JG258B HP 5800-48G TAA-compliant Switch with 1 Interface Slot\n - JG225A HP 5800AF-48G Switch\n - JG225B HP 5800AF-48G Switch\n - JG242A HP 5800-48G-PoE+ TAA-compliant Switch with 2 Interface Slots\n - JG242B HP 5800-48G-PoE+ TAA-compliant Switch with 2 Interface\n - JG243A HP 5820-24XG-SFP+ TAA-compliant Switch\n - JG243B HP 5820-24XG-SFP+ TAA-compliant Switch\n - JG259A HP 5820X-14XG-SFP+ TAA-compliant Switch with 2 Interface Slots\n\u0026 1 OAA Slot\n - JG259B HP 5820-14XG-SFP+ TAA-compliant Switch with 2 Interface Slots\nand 1 OAA Slot\n - JC106A HP 5820-14XG-SFP+ Switch with 2 Slots\n - JC106B HP 5820-14XG-SFP+ Switch with 2 Interface Slots \u0026 1 OAA Slot\n - JG219A HP 5820AF-24XG Switch\n - JG219B HP 5820AF-24XG Switch\n - JC102A HP 5820-24XG-SFP+ Switch\n - JC102B HP 5820-24XG-SFP+ Switch\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + 5500 HI (Comware 5) - Version: R5501P28\n * HP Network Products\n - JG311A HP 5500-24G-4SFP HI Switch with 2 Interface Slots\n - JG312A HP 5500-48G-4SFP HI Switch with 2 Interface Slots\n - JG541A HP 5500-24G-PoE+-4SFP HI Switch with 2 Interface Slots\n - JG542A HP 5500-48G-PoE+-4SFP HI Switch with 2 Interface Slots\n - JG543A HP 5500-24G-SFP HI Switch with 2 Interface Slots\n - JG679A HP 5500-24G-PoE+-4SFP HI TAA-compliant Switch with 2 Interface\nSlots\n - JG680A HP 5500-48G-PoE+-4SFP HI TAA-compliant Switch with 2 Interface\nSlots\n - JG681A HP 5500-24G-SFP HI TAA-compliant Switch with 2 Interface Slots\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + 5500 EI (Comware 5) - Version: R2221P30\n * HP Network Products\n - JD373A HP 5500-24G DC EI Switch\n - JD374A HP 5500-24G-SFP EI Switch\n - JD375A HP 5500-48G EI Switch\n - JD376A HP 5500-48G-PoE EI Switch\n - JD377A HP 5500-24G EI Switch\n - JD378A HP 5500-24G-PoE EI Switch\n - JD379A HP 5500-24G-SFP DC EI Switch\n - JG240A HP 5500-48G-PoE+ EI Switch with 2 Interface Slots\n - JG241A HP 5500-24G-PoE+ EI Switch with 2 Interface Slots\n - JG249A HP 5500-24G-SFP EI TAA-compliant Switch with 2 Interface\n - JG250A HP 5500-24G EI TAA-compliant Switch with 2 Interface Slots\n - JG251A HP 5500-48G EI TAA-compliant Switch with 2 Interface Slots\n - JG252A HP 5500-24G-PoE+ EI TAA-compliant Switch with 2 Interface\nSlots\n - JG253A HP 5500-48G-PoE+ EI TAA-compliant Switch with 2 Interface\nSlots\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + 4800G (Comware 5) - Version: R2221P30\n * HP Network Products\n - JD007A HP 4800-24G Switch\n - JD008A HP 4800-24G-PoE Switch\n - JD009A HP 4800-24G-SFP Switch\n - JD010A HP 4800-48G Switch\n - JD011A HP 4800-48G-PoE Switch\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + 5500SI (Comware 5) - Version: R2221P30\n * HP Network Products\n - JD369A HP 5500-24G SI Switch\n - JD370A HP 5500-48G SI Switch\n - JD371A HP 5500-24G-PoE SI Switch\n - JD372A HP 5500-48G-PoE SI Switch\n - JG238A HP 5500-24G-PoE+ SI Switch with 2 Interface Slots\n - JG239A HP 5500-48G-PoE+ SI Switch with 2 Interface Slots\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + 4500G (Comware 5) - Version: R2221P30\n * HP Network Products\n - JF428A HP 4510-48G Switch\n - JF847A HP 4510-24G Switch\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + 5120 EI (Comware 5) - Version: R2221P30\n * HP Network Products\n - JE066A HP 5120-24G EI Switch\n - JE067A HP 5120-48G EI Switch\n - JE068A HP 5120-24G EI Switch with 2 Interface Slots\n - JE069A HP 5120-48G EI Switch with 2 Interface Slots\n - JE070A HP 5120-24G-PoE EI 2-slot Switch\n - JE071A HP 5120-48G-PoE EI 2-slot Switch\n - JG236A HP 5120-24G-PoE+ EI Switch with 2 Interface Slots\n - JG237A HP 5120-48G-PoE+ EI Switch with 2 Interface Slots\n - JG245A HP 5120-24G EI TAA-compliant Switch with 2 Interface Slots\n - JG246A HP 5120-48G EI TAA-compliant Switch with 2 Interface Slots\n - JG247A HP 5120-24G-PoE+ EI TAA-compliant Switch with 2 Slots\n - JG248A HP 5120-48G-PoE+ EI TAA-compliant Switch with 2 Slots\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + 4210G (Comware 5) - Version: R2221P30\n * HP Network Products\n - JF844A HP 4210-24G Switch\n - JF845A HP 4210-48G Switch\n - JF846A HP 4210-24G-PoE Switch\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + 5120 SI (Comware 5) - Version: R1518P03\n * HP Network Products\n - JE072A HP 5120-48G SI Switch\n - JE072B HPE 5120 48G SI Switch\n - JE073A HP 5120-16G SI Switch\n - JE073B HPE 5120 16G SI Switch\n - JE074A HP 5120-24G SI Switch\n - JE074B HPE 5120 24G SI Switch\n - JG091A HP 5120-24G-PoE+ (370W) SI Switch\n - JG091B HPE 5120 24G PoE+ (370W) SI Switch\n - JG092A HP 5120-24G-PoE+ (170W) SI Switch\n - JG309B HPE 5120 8G PoE+ (180W) SI Switch\n - JG310B HPE 5120 8G PoE+ (65W) SI Switch\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + 3610 (Comware 5) - Version: R5319P16\n * HP Network Products\n - JD335A HP 3610-48 Switch\n - JD336A HP 3610-24-4G-SFP Switch\n - JD337A HP 3610-24-2G-2G-SFP Switch\n - JD338A HP 3610-24-SFP Switch\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + 3600V2 (Comware 5) - Version: R2111P04\n * HP Network Products\n - JG299A HP 3600-24 v2 EI Switch\n - JG299B HP 3600-24 v2 EI Switch\n - JG300A HP 3600-48 v2 EI Switch\n - JG300B HP 3600-48 v2 EI Switch\n - JG301A HP 3600-24-PoE+ v2 EI Switch\n - JG301B HP 3600-24-PoE+ v2 EI Switch\n - JG301C HP 3600-24-PoE+ v2 EI Switch\n - JG302A HP 3600-48-PoE+ v2 EI Switch\n - JG302B HP 3600-48-PoE+ v2 EI Switch\n - JG302C HP 3600-48-PoE+ v2 EI Switch\n - JG303A HP 3600-24-SFP v2 EI Switch\n - JG303B HP 3600-24-SFP v2 EI Switch\n - JG304A HP 3600-24 v2 SI Switch\n - JG304B HP 3600-24 v2 SI Switch\n - JG305A HP 3600-48 v2 SI Switch\n - JG305B HP 3600-48 v2 SI Switch\n - JG306A HP 3600-24-PoE+ v2 SI Switch\n - JG306B HP 3600-24-PoE+ v2 SI Switch\n - JG306C HP 3600-24-PoE+ v2 SI Switch\n - JG307A HP 3600-48-PoE+ v2 SI Switch\n - JG307B HP 3600-48-PoE+ v2 SI Switch\n - JG307C HP 3600-48-PoE+ v2 SI Switch\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + 3100V2 (Comware 5) - Version: R5213P03\n * HP Network Products\n - JD313B HPE 3100 24 PoE v2 EI Switch\n - JD318B HPE 3100 8 v2 EI Switch\n - JD319B HPE 3100 16 v2 EI Switch\n - JD320B HPE 3100 24 v2 EI Switch\n - JG221A HPE 3100 8 v2 SI Switch\n - JG222A HPE 3100 16 v2 SI Switch\n - JG223A HPE 3100 24 v2 SI Switch\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + HP870 (Comware 5) - Version: R2607P55\n * HP Network Products\n - JG723A HP 870 Unified Wired-WLAN Appliance\n - JG725A HP 870 Unified Wired-WLAN TAA-compliant Appliance\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + HP850 (Comware 5) - Version: R2607P55\n * HP Network Products\n - JG722A HP 850 Unified Wired-WLAN Appliance\n - JG724A HP 850 Unified Wired-WLAN TAA-compliant Appliance\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + HP830 (Comware 5) - Version: R3507P55\n * HP Network Products\n - JG640A HP 830 24-Port PoE+ Unified Wired-WLAN Switch\n - JG641A HP 830 8-port PoE+ Unified Wired-WLAN Switch\n - JG646A HP 830 24-Port PoE+ Unified Wired-WLAN TAA-compliant Switch\n - JG647A HP 830 8-Port PoE+ Unified Wired-WLAN TAA-compliant\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + HP6000 (Comware 5) - Version: R2507P55\n * HP Network Products\n - JG639A HP 10500/7500 20G Unified Wired-WLAN Module\n - JG645A HP 10500/7500 20G Unified Wired-WLAN TAA-compliant Module\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + WX5004-EI (Comware 5) - Version: R2507P55\n * HP Network Products\n - JD447B HP WX5002 Access Controller\n - JD448A HP WX5004 Access Controller\n - JD448B HP WX5004 Access Controller\n - JD469A HP WX5004 Access Controller\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + SecBlade FW (Comware 5) - Version: R3181P09\n * HP Network Products\n - JC635A HP 12500 VPN Firewall Module\n - JD245A HP 9500 VPN Firewall Module\n - JD249A HP 10500/7500 Advanced VPN Firewall Module\n - JD250A HP 6600 Firewall Processing Router Module\n - JD251A HP 8800 Firewall Processing Module\n - JD255A HP 5820 VPN Firewall Module\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + F1000-E (Comware 5) - Version: TBD still fixing\n * HP Network Products\n - JD272A HP F1000-E VPN Firewall Appliance\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + F1000-A-EI (Comware 5) - Version: TBD still fixing\n * HP Network Products\n - JG214A HP F1000-A-EI VPN Firewall Appliance\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + F1000-S-EI (Comware 5) - Version: TBD still fixing\n * HP Network Products\n - JG213A HP F1000-S-EI VPN Firewall Appliance\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + F1000-A-EI/F1000-S-EI - Version: R3734P10\n * HP Network Products\n - JD272A HP F1000-E VPN Firewall Appliance\n - JG214A HP F1000-A-EI VPN Firewall Appliance\n - JG213A HP F1000-S-EI VPN Firewall Appliance\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + F5000-A (Comware 5) - Version: F3210P27\n * HP Network Products\n - JD259A HP A5000-A5 VPN Firewall Chassis\n - JG215A HP F5000 Firewall Main Processing Unit\n - JG216A HP F5000 Firewall Standalone Chassis\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + U200S and CS (Comware 5) - Version: F5123P34\n * HP Network Products\n - JD273A HP U200-S UTM Appliance\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + U200A and M (Comware 5) - Version: F5123P34\n * HP Network Products\n - JD275A HP U200-A UTM Appliance\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + F5000-C/S (Comware 5) - Version: TBD still fixing\n * HP Network Products\n - JG650A HP F5000-C VPN Firewall Appliance\n - JG370A HP F5000-S VPN Firewall Appliance\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + SecBlade III (Comware 5) - Version: TBD still fixing\n * HP Network Products\n - JG371A HP 12500 20Gbps VPN Firewall Module\n - JG372A HP 10500/11900/7500 20Gbps VPN Firewall Module\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + 6600 RSE RU (Comware 5 Low Encryption SW) - Version: R3303P31\n * HP Network Products\n - JC177A HP 6608 Router\n - JC177B HP 6608 Router Chassis\n - JC178A HP 6604 Router Chassis\n - JC178B HP 6604 Router Chassis\n - JC496A HP 6616 Router Chassis\n - JC566A HP 6600 RSE-X1 Router Main Processing Unit\n - JG780A HP 6600 RSE-X1 TAA-compliant Main Processing Unit\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + 6600 RPE RU (Comware 5 Low Encryption SW) - Version: R3303P31\n * HP Network Products\n - JC165A HP 6600 RPE-X1 Router Module\n - JC177A HP 6608 Router\n - JC177B HPE FlexNetwork 6608 Router Chassis\n - JC178A HPE FlexNetwork 6604 Router Chassis\n - JC178B HPE FlexNetwork 6604 Router Chassis\n - JC496A HPE FlexNetwork 6616 Router Chassis\n - JG781A HP 6600 RPE-X1 TAA-compliant Main Processing Unit\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + 6602 RU (Comware 5 Low Encryption SW) - Version: R3303P31\n * HP Network Products\n - JC176A HP 6602 Router Chassis\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + HSR6602 RU (Comware 5 Low Encryption SW) - Version: R3303P31\n * HP Network Products\n - JC177A HP 6608 Router\n - JC177B HP 6608 Router Chassis\n - JC178A HP 6604 Router Chassis\n - JC178B HP 6604 Router Chassis\n - JC496A HP 6616 Router Chassis\n - JG353A HP HSR6602-G Router\n - JG354A HP HSR6602-XG Router\n - JG355A HP 6600 MCP-X1 Router Main Processing Unit\n - JG356A HP 6600 MCP-X2 Router Main Processing Unit\n - JG776A HP HSR6602-G TAA-compliant Router\n - JG777A HP HSR6602-XG TAA-compliant Router\n - JG778A HP 6600 MCP-X2 Router TAA-compliant Main Processing Unit\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + HSR6800 RU (Comware 5 Low Encryption SW) - Version: R3303P31\n * HP Network Products\n - JG361A HP HSR6802 Router Chassis\n - JG361B HP HSR6802 Router Chassis\n - JG362A HP HSR6804 Router Chassis\n - JG362B HP HSR6804 Router Chassis\n - JG363A HP HSR6808 Router Chassis\n - JG363B HP HSR6808 Router Chassis\n - JG364A HP HSR6800 RSE-X2 Router Main Processing Unit\n - JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing Unit\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + SMB1910 (Comware 5) - Version: R1115\n * HP Network Products\n - JG540A HP 1910-48 Switch\n - JG539A HP 1910-24-PoE+ Switch\n - JG538A HP 1910-24 Switch\n - JG537A HP 1910-8 -PoE+ Switch\n - JG536A HP 1910-8 Switch\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + SMB1920 (Comware 5) - Version: R1114\n * HP Network Products\n - JG928A HP 1920-48G-PoE+ (370W) Switch\n - JG927A HP 1920-48G Switch\n - JG926A HP 1920-24G-PoE+ (370W) Switch\n - JG925A HP 1920-24G-PoE+ (180W) Switch\n - JG924A HP 1920-24G Switch\n - JG923A HP 1920-16G Switch\n - JG922A HP 1920-8G-PoE+ (180W) Switch\n - JG921A HP 1920-8G-PoE+ (65W) Switch\n - JG920A HP 1920-8G Switch\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + V1910 (Comware 5) - Version: R1518P03\n * HP Network Products\n - JE005A HP 1910-16G Switch\n - JE006A HP 1910-24G Switch\n - JE007A HP 1910-24G-PoE (365W) Switch\n - JE008A HP 1910-24G-PoE(170W) Switch\n - JE009A HP 1910-48G Switch\n - JG348A HP 1910-8G Switch\n - JG349A HP 1910-8G-PoE+ (65W) Switch\n - JG350A HP 1910-8G-PoE+ (180W) Switch\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + SMB 1620 (Comware 5) - Version: R1112\n * HP Network Products\n - JG914A HP 1620-48G Switch\n - JG913A HP 1620-24G Switch\n - JG912A HP 1620-8G Switch\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n + NJ5000 - Version: R1108\n * HP Network Products\n - JH237A HPE FlexNetwork NJ5000 5G PoE+ Walljack\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n\n\n**COMWARE 7 Products**\n\n + 12500 (Comware 7) - Version: R7377P02\n * HP Network Products\n - JC072B HP 12500 Main Processing Unit\n - JC085A HP A12518 Switch Chassis\n - JC086A HP A12508 Switch Chassis\n - JC652A HP 12508 DC Switch Chassis\n - JC653A HP 12518 DC Switch Chassis\n - JC654A HP 12504 AC Switch Chassis\n - JC655A HP 12504 DC Switch Chassis\n - JF430A HP A12518 Switch Chassis\n - JF430B HP 12518 Switch Chassis\n - JF430C HP 12518 AC Switch Chassis\n - JF431A HP A12508 Switch Chassis\n - JF431B HP 12508 Switch Chassis\n - JF431C HP 12508 AC Switch Chassis\n - JG497A HP 12500 MPU w/Comware V7 OS\n - JG782A HP FF 12508E AC Switch Chassis\n - JG783A HP FF 12508E DC Switch Chassis\n - JG784A HP FF 12518E AC Switch Chassis\n - JG785A HP FF 12518E DC Switch Chassis\n - JG802A HP FF 12500E MPU\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n - CVE-2015-7979\n - CVE-2015-8138\n + 10500 (Comware 7) - Version: R7184\n * HP Network Products\n - JC611A HP 10508-V Switch Chassis\n - JC612A HP 10508 Switch Chassis\n - JC613A HP 10504 Switch Chassis\n - JC748A HP 10512 Switch Chassis\n - JG608A HP FlexFabric 11908-V Switch Chassis\n - JG609A HP FlexFabric 11900 Main Processing Unit\n - JG820A HP 10504 TAA Switch Chassis\n - JG821A HP 10508 TAA Switch Chassis\n - JG822A HP 10508-V TAA Switch Chassis\n - JG823A HP 10512 TAA Switch Chassis\n - JG496A HP 10500 Type A MPU w/Comware v7 OS\n - JH198A HP 10500 Type D Main Processing Unit with Comware v7 Operating\nSystem\n - JH206A HP 10500 Type D TAA-compliant with Comware v7 Operating System\nMain Processing Unit\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n - CVE-2015-7979\n - CVE-2015-8138\n + 5900 (Comware 7) - Version: R2422P02\n * HP Network Products\n - JC772A HP 5900AF-48XG-4QSFP+ Switch\n - JG296A HP 5920AF-24XG Switch\n - JG336A HP 5900AF-48XGT-4QSFP+ Switch\n - JG510A HP 5900AF-48G-4XG-2QSFP+ Switch\n - JG554A HP 5900AF-48XG-4QSFP+ TAA Switch\n - JG555A HP 5920AF-24XG TAA Switch\n - JG838A HP FF 5900CP-48XG-4QSFP+ Switch\n - JH036A HP FlexFabric 5900CP 48XG 4QSFP+ TAA-Compliant\n - JH037A HP 5900AF 48XGT 4QSFP+ TAA-Compliant Switch\n - JH038A HP 5900AF 48G 4XG 2QSFP+ TAA-Compliant\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n - CVE-2015-7979\n - CVE-2015-8138\n + MSR1000 (Comware 7) - Version: R0306P52\n * HP Network Products\n - JG875A HP MSR1002-4 AC Router\n - JH060A HP MSR1003-8S AC Router\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n - CVE-2015-7979\n - CVE-2015-8138\n + MSR2000 (Comware 7) - Version: R0306P52\n * HP Network Products\n - JG411A HP MSR2003 AC Router\n - JG734A HP MSR2004-24 AC Router\n - JG735A HP MSR2004-48 Router\n - JG866A HP MSR2003 TAA-compliant AC Router\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n - CVE-2015-7979\n - CVE-2015-8138\n + MSR3000 (Comware 7) - Version: R0306P52\n * HP Network Products\n - JG404A HP MSR3064 Router\n - JG405A HP MSR3044 Router\n - JG406A HP MSR3024 AC Router\n - JG407A HP MSR3024 DC Router\n - JG408A HP MSR3024 PoE Router\n - JG409A HP MSR3012 AC Router\n - JG410A HP MSR3012 DC Router\n - JG861A HP MSR3024 TAA-compliant AC Router\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n - CVE-2015-7979\n - CVE-2015-8138\n + MSR4000 (Comware 7) - Version: R0306P52\n * HP Network Products\n - JG402A HP MSR4080 Router Chassis\n - JG403A HP MSR4060 Router Chassis\n - JG412A HP MSR4000 MPU-100 Main Processing Unit\n - JG869A HP MSR4000 TAA-compliant MPU-100 Main Processing Unit\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n - CVE-2015-7979\n - CVE-2015-8138\n + VSR (Comware 7) - Version: E0324\n * HP Network Products\n - JG810AAE HP VSR1001 Virtual Services Router 60 Day Evaluation\nSoftware\n - JG811AAE HP VSR1001 Comware 7 Virtual Services Router\n - JG812AAE HP VSR1004 Comware 7 Virtual Services Router\n - JG813AAE HP VSR1008 Comware 7 Virtual Services Router\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n - CVE-2015-7979\n - CVE-2015-8138\n + 7900 (Comware 7) - Version: R2152\n * HP Network Products\n - JG682A HP FlexFabric 7904 Switch Chassis\n - JG841A HP FlexFabric 7910 Switch Chassis\n - JG842A HP FlexFabric 7910 7.2Tbps Fabric / Main Processing Unit\n - JH001A HP FlexFabric 7910 2.4Tbps Fabric / Main Processing Unit\n - JH122A HP FlexFabric 7904 TAA-compliant Switch Chassis\n - JH123A HP FlexFabric 7910 TAA-compliant Switch Chassis\n - JH124A HP FlexFabric 7910 7.2Tbps TAA-compliant Fabric/Main\nProcessing Unit\n - JH125A HP FlexFabric 7910 2.4Tbps TAA-compliant Fabric/Main\nProcessing Unit\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n - CVE-2015-7979\n - CVE-2015-8138\n + 5130 (Comware 7) - Version: R3115P01\n * HP Network Products\n - JG932A HP 5130-24G-4SFP+ EI Switch\n - JG933A HP 5130-24G-SFP-4SFP+ EI Switch\n - JG934A HP 5130-48G-4SFP+ EI Switch\n - JG936A HP 5130-24G-PoE+-4SFP+ (370W) EI Switch\n - JG937A HP 5130-48G-PoE+-4SFP+ (370W) EI Switch\n - JG938A HP 5130-24G-2SFP+-2XGT EI Switch\n - JG939A HP 5130-48G-2SFP+-2XGT EI Switch\n - JG940A HP 5130-24G-PoE+-2SFP+-2XGT (370W) EI Switch\n - JG941A HP 5130-48G-PoE+-2SFP+-2XGT (370W) EI Switch\n - JG975A HP 5130-24G-4SFP+ EI Brazil Switch\n - JG976A HP 5130-48G-4SFP+ EI Brazil Switch\n - JG977A HP 5130-24G-PoE+-4SFP+ (370W) EI Brazil Switch\n - JG978A HP 5130-48G-PoE+-4SFP+ (370W) EI Brazil Switch\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n - CVE-2015-7979\n - CVE-2015-8138\n + 6125XLG - Version: R2422P02\n * HP Network Products\n - 711307-B21 HP 6125XLG Blade Switch\n - 737230-B21 HP 6125XLG Blade Switch with TAA\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n - CVE-2015-7979\n - CVE-2015-8138\n + 6127XLG - Version: R2422P02\n * HP Network Products\n - 787635-B21 HP 6127XLG Blade Switch Opt Kit\n - 787635-B22 HP 6127XLG Blade Switch with TAA\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n - CVE-2015-7979\n - CVE-2015-8138\n + Moonshot - Version: R2422P02\n * HP Network Products\n - 786617-B21 - HP Moonshot-45Gc Switch Module\n - 704654-B21 - HP Moonshot-45XGc Switch Module\n - 786619-B21 - HP Moonshot-180XGc Switch Module\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n - CVE-2015-7979\n - CVE-2015-8138\n + 5700 (Comware 7) - Version: R2422P02\n * HP Network Products\n - JG894A HP FlexFabric 5700-48G-4XG-2QSFP+ Switch\n - JG895A HP FlexFabric 5700-48G-4XG-2QSFP+ TAA-compliant Switch\n - JG896A HP FlexFabric 5700-40XG-2QSFP+ Switch\n - JG897A HP FlexFabric 5700-40XG-2QSFP+ TAA-compliant Switch\n - JG898A HP FlexFabric 5700-32XGT-8XG-2QSFP+ Switch\n - JG899A HP FlexFabric 5700-32XGT-8XG-2QSFP+ TAA-compliant Switch\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n - CVE-2015-7979\n - CVE-2015-8138\n + 5930 (Comware 7) - Version: R2422P02\n * HP Network Products\n - JG726A HP FlexFabric 5930 32QSFP+ Switch\n - JG727A HP FlexFabric 5930 32QSFP+ TAA-compliant Switch\n - JH178A HP FlexFabric 5930 2QSFP+ 2-slot Switch\n - JH179A HP FlexFabric 5930 4-slot Switch\n - JH187A HP FlexFabric 5930 2QSFP+ 2-slot TAA-compliant Switch\n - JH188A HP FlexFabric 5930 4-slot TAA-compliant Switch\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n - CVE-2015-7979\n - CVE-2015-8138\n + HSR6600 (Comware 7) - Version: R7103P09\n * HP Network Products\n - JG353A HP HSR6602-G Router\n - JG354A HP HSR6602-XG Router\n - JG776A HP HSR6602-G TAA-compliant Router\n - JG777A HP HSR6602-XG TAA-compliant Router\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n - CVE-2015-7979\n - CVE-2015-8138\n + HSR6800 (Comware 7) - Version: R7103P10\n * HP Network Products\n - JG361A HP HSR6802 Router Chassis\n - JG361B HP HSR6802 Router Chassis\n - JG362A HP HSR6804 Router Chassis\n - JG362B HP HSR6804 Router Chassis\n - JG363A HP HSR6808 Router Chassis\n - JG363B HP HSR6808 Router Chassis\n - JG364A HP HSR6800 RSE-X2 Router Main Processing Unit\n - JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing\n - JH075A HP HSR6800 RSE-X3 Router Main Processing Unit\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n - CVE-2015-7979\n - CVE-2015-8138\n + 1950 (Comware 7) - Version: R3115P01\n * HP Network Products\n - JG960A HP 1950-24G-4XG Switch\n - JG961A HP 1950-48G-2SFP+-2XGT Switch\n - JG962A HP 1950-24G-2SFP+-2XGT-PoE+(370W) Switch\n - JG963A HP 1950-48G-2SFP+-2XGT-PoE+(370W) Switch\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n - CVE-2015-7979\n - CVE-2015-8138\n + 7500 (Comware 7) - Version: R7184\n * HP Network Products\n - JD238C HP 7510 Switch Chassis\n - JD239C HP 7506 Switch Chassis\n - JD240C HP 7503 Switch Chassis\n - JD242C HP 7502 Switch Chassis\n - JH207A HP 7500 1.2Tbps Fabric with 2-port 40GbE QSFP+ for IRF-Only\nMain Processing Unit\n - JH208A HP 7502 Main Processing Unit\n - JH209A HP 7500 2.4Tbps Fabric with 8-port 1/10GbE SFP+ and 2-port\n40GbE QSFP+ Main Processing Unit\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n - CVE-2015-7979\n - CVE-2015-8138\n + 5510HI (Comware 7) - Version: R1120P10\n * HP Network Products\n - JH145A HPE 5510 24G 4SFP+ HI 1-slot Switch\n - JH146A HPE 5510 48G 4SFP+ HI 1-slot Switch\n - JH147A HPE 5510 24G PoE+ 4SFP+ HI 1-slot Switch\n - JH148A HPE 5510 48G PoE+ 4SFP+ HI 1-slot Switch\n - JH149A HPE 5510 24G SFP 4SFP+ HI 1-slot Switch\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n - CVE-2015-7979\n - CVE-2015-8138\n + 5130HI (Comware 7) - Version: R1120P10\n * HP Network Products\n - JH323A HPE 5130 24G 4SFP+ 1-slot HI Switch\n - JH324A HPE 5130 48G 4SFP+ 1-slot HI Switch\n - JH325A HPE 5130 24G PoE+ 4SFP+ 1-slot HI Switch\n - JH326A HPE 5130 48G PoE+ 4SFP+ 1-slot HI Switch\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n - CVE-2015-7979\n - CVE-2015-8138\n + 5940 - Version: R2508\n * HP Network Products\n - JH390A HPE FlexFabric 5940 48SFP+ 6QSFP28 Switch\n - JH391A HPE FlexFabric 5940 48XGT 6QSFP28 Switch\n - JH394A HPE FlexFabric 5940 48XGT 6QSFP+ Switch\n - JH395A HPE FlexFabric 5940 48SFP+ 6QSFP+ Switch\n - JH396A HPE FlexFabric 5940 32QSFP+ Switch\n - JH397A HPE FlexFabric 5940 2-slot Switch\n - JH398A HPE FlexFabric 5940 4-slot Switch\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n - CVE-2015-7979\n - CVE-2015-8138\n + 12900E (Comware 7) - Version: R2609\n * HP Network Products\n - JG619A HP FlexFabric 12910 Switch AC Chassis\n - JG621A HP FlexFabric 12910 Main Processing Unit\n - JG632A HP FlexFabric 12916 Switch AC Chassis\n - JG634A HP FlexFabric 12916 Main Processing Unit\n - JH104A HP FlexFabric 12900E Main Processing Unit\n - JH114A HP FlexFabric 12910 TAA-compliant Main Processing Unit\n - JH263A HP FlexFabric 12904E Main Processing Unit\n - JH255A HP FlexFabric 12908E Switch Chassis\n - JH262A HP FlexFabric 12904E Switch Chassis\n - JH113A HP FlexFabric 12910 TAA-compliant Switch AC Chassis\n - JH103A HP FlexFabric 12916E Switch Chassis\n * CVEs\n - CVE-2015-7973\n - CVE-2015-7974\n - CVE-2015-7979\n - CVE-2015-8138\n\n\n**VCX Products**\n\n + VCX - Version: 9.8.19\n * HP Network Products\n - J9672A HP VCX V7205 Platform w/ DL360 G7 Srvr\n - J9668A HP VCX IPC V7005 Pltfrm w/ DL120 G6 Srvr\n - JC517A HP VCX V7205 Platform w/DL 360 G6 Server\n - JE355A HP VCX V6000 Branch Platform 9.0\n - JC516A HP VCX V7005 Platform w/DL 120 G6 Server\n - JC518A HP VCX Connect 200 Primry 120 G6 Server\n - J9669A HP VCX IPC V7310 Pltfrm w/ DL360 G7 Srvr\n - JE341A HP VCX Connect 100 Secondary\n - JE252A HP VCX Connect Primary MIM Module\n - JE253A HP VCX Connect Secondary MIM Module\n - JE254A HP VCX Branch MIM Module\n - JE355A HP VCX V6000 Branch Platform 9.0\n - JD028A HP MS30-40 RTR w/VCX + T1/FXO/FXS/Mod\n - JD023A HP MSR30-40 Router with VCX MIM Module\n - JD024A HP MSR30-16 RTR w/VCX Ent Br Com MIM\n - JD025A HP MSR30-16 RTR w/VCX + 4FXO/2FXS Mod\n - JD026A HP MSR30-16 RTR w/VCX + 8FXO/4FXS Mod\n - JD027A HP MSR30-16 RTR w/VCX + 8BRI/4FXS Mod\n - JD029A HP MSR30-16 RTR w/VCX + E1/4BRI/4FXS\n - JE340A HP VCX Connect 100 Pri Server 9.0\n - JE342A HP VCX Connect 100 Sec Server 9.0\n * CVEs\n - CVE-2015-7975\n - CVE-2015-8158\n\n**Note:** Please contact HPE Technical Support if any assistance is needed\nacquiring the software updates. \n\nHISTORY\nVersion:1 (rev.1) - 25 May 2017 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running Hewlett Packard Enterprise (HPE) software\nproducts should be applied in accordance with the customer\u0027s patch management\npolicy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HPE Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hpe.com. \n\nReport: To report a potential security vulnerability for any HPE supported\nproduct:\n Web form: https://www.hpe.com/info/report-security-vulnerability\n Email: security-alert@hpe.com\n\nSubscribe: To initiate a subscription to receive future HPE Security Bulletin\nalerts via Email: http://www.hpe.com/support/Subscriber_Choice\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here: http://www.hpe.com/support/Security_Bulletin_Archive\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HPE General Software\nHF = HPE Hardware and Firmware\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPV = ProCurve\nST = Storage Software\nUX = HP-UX\n\nCopyright 2016 Hewlett Packard Enterprise\n\nHewlett Packard Enterprise shall not be liable for technical or editorial\nerrors or omissions contained herein. The information provided is provided\n\"as is\" without warranty of any kind. To the extent permitted by law, neither\nHP or its affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. Hewlett\nPackard Enterprise and the names of Hewlett Packard Enterprise products\nreferenced herein are trademarks of Hewlett Packard Enterprise in the United\nStates and other countries. Other product and company names mentioned herein\nmay be trademarks of their respective owners. \n\n\nHere are the details from the Slackware 14.1 ChangeLog:\n+--------------------------+\npatches/packages/ntp-4.2.8p6-i486-1_slack14.1.txz: Upgraded. \n In addition to bug fixes and enhancements, this release fixes\n several low and medium severity vulnerabilities. \n For more information, see:\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7973\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7975\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7976\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158\n (* Security fix *)\n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated package for Slackware 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/ntp-4.2.8p6-i486-1_slack13.0.txz\n\nUpdated package for Slackware x86_64 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/ntp-4.2.8p6-x86_64-1_slack13.0.txz\n\nUpdated package for Slackware 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/ntp-4.2.8p6-i486-1_slack13.1.txz\n\nUpdated package for Slackware x86_64 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/ntp-4.2.8p6-x86_64-1_slack13.1.txz\n\nUpdated package for Slackware 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/ntp-4.2.8p6-i486-1_slack13.37.txz\n\nUpdated package for Slackware x86_64 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/ntp-4.2.8p6-x86_64-1_slack13.37.txz\n\nUpdated package for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/ntp-4.2.8p6-i486-1_slack14.0.txz\n\nUpdated package for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/ntp-4.2.8p6-x86_64-1_slack14.0.txz\n\nUpdated package for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/ntp-4.2.8p6-i486-1_slack14.1.txz\n\nUpdated package for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/ntp-4.2.8p6-x86_64-1_slack14.1.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/ntp-4.2.8p6-i586-1.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/ntp-4.2.8p6-x86_64-1.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 13.0 package:\n31365ae4f12849e65d4ad1c8c7d5f89a ntp-4.2.8p6-i486-1_slack13.0.txz\n\nSlackware x86_64 13.0 package:\n5a2d24bdacd8dd05ab9e0613c829212b ntp-4.2.8p6-x86_64-1_slack13.0.txz\n\nSlackware 13.1 package:\ne70f7422bc81c144e6fac1df2c202634 ntp-4.2.8p6-i486-1_slack13.1.txz\n\nSlackware x86_64 13.1 package:\nf6637f6d24b94a6b17c68467956a6283 ntp-4.2.8p6-x86_64-1_slack13.1.txz\n\nSlackware 13.37 package:\n82601e105f95e324dfd1e2f0df513673 ntp-4.2.8p6-i486-1_slack13.37.txz\n\nSlackware x86_64 13.37 package:\nd3ba32d46f7eef8f75a3444bbee4c677 ntp-4.2.8p6-x86_64-1_slack13.37.txz\n\nSlackware 14.0 package:\nc5ff13e58fbbea0b7a677e947449e7b1 ntp-4.2.8p6-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 package:\n9e2abfaf0b0b7bf84a8a4db89f60eff6 ntp-4.2.8p6-x86_64-1_slack14.0.txz\n\nSlackware 14.1 package:\ne1e6b84808b7562314e0e29479153553 ntp-4.2.8p6-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 package:\n8db0a4ca68805c7f5e487d5bcd69d098 ntp-4.2.8p6-x86_64-1_slack14.1.txz\n\nSlackware -current package:\nf96f443f54a74c20b5eb67467f5958ea n/ntp-4.2.8p6-i586-1.txz\n\nSlackware x86_64 -current package:\n5e256f2e1906b4c75047a966996a7a41 n/ntp-4.2.8p6-x86_64-1.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the package as root:\n# upgradepkg ntp-4.2.8p6-i486-1_slack14.1.txz\n\nThen, restart the NTP daemon:\n\n# sh /etc/rc.d/rc.ntpd restart\n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list: |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message: |\n| |\n| unsubscribe slackware-security |\n| |\n| You will get a confirmation message back containing instructions to |\n| complete the process. Please do not reply to this email address. \n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201607-15\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: NTP: Multiple vulnerabilities\n Date: July 20, 2016\n Bugs: #563774, #572452, #581528, #584954\n ID: 201607-15\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in NTP, the worst of which\ncould lead to Denial of Service. Please review the\nCVE identifiers referenced below for details. \n\nResolution\n==========\n\nAll NTP users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/ntp-4.2.8_p8\"\n\nReferences\n==========\n\n[ 1 ] CVE-2015-7691\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7691\n[ 2 ] CVE-2015-7692\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7692\n[ 3 ] CVE-2015-7701\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7701\n[ 4 ] CVE-2015-7702\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7702\n[ 5 ] CVE-2015-7703\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7703\n[ 6 ] CVE-2015-7704\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7704\n[ 7 ] CVE-2015-7705\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7705\n[ 8 ] CVE-2015-7848\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7848\n[ 9 ] CVE-2015-7849\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7849\n[ 10 ] CVE-2015-7850\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7850\n[ 11 ] CVE-2015-7851\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7851\n[ 12 ] CVE-2015-7852\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7852\n[ 13 ] CVE-2015-7853\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7853\n[ 14 ] CVE-2015-7854\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7854\n[ 15 ] CVE-2015-7855\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7855\n[ 16 ] CVE-2015-7871\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7871\n[ 17 ] CVE-2015-7973\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7973\n[ 18 ] CVE-2015-7974\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7974\n[ 19 ] CVE-2015-7975\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7975\n[ 20 ] CVE-2015-7976\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7976\n[ 21 ] CVE-2015-7977\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7977\n[ 22 ] CVE-2015-7978\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7978\n[ 23 ] CVE-2015-7979\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7979\n[ 24 ] CVE-2015-8138\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8138\n[ 25 ] CVE-2015-8139\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8139\n[ 26 ] CVE-2015-8140\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8140\n[ 27 ] CVE-2015-8158\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8158\n[ 28 ] CVE-2016-1547\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1547\n[ 29 ] CVE-2016-1548\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1548\n[ 30 ] CVE-2016-1549\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1549\n[ 31 ] CVE-2016-1550\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1550\n[ 32 ] CVE-2016-1551\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1551\n[ 33 ] CVE-2016-2516\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2516\n[ 34 ] CVE-2016-2517\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2517\n[ 35 ] CVE-2016-2518\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2518\n[ 36 ] CVE-2016-2519\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2519\n[ 37 ] CVE-2016-4953\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4953\n[ 38 ] CVE-2016-4954\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4954\n[ 39 ] CVE-2016-4955\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4955\n[ 40 ] CVE-2016-4956\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4956\n[ 41 ] CVE-2016-4957\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4957\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201607-15\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2016 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: ntp security update\nAdvisory ID: RHSA-2016:0063-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2016-0063.html\nIssue date: 2016-01-25\nCVE Names: CVE-2015-8138 \n=====================================================================\n\n1. Summary:\n\nUpdated ntp packages that fix one security issue are now available for Red\nHat Enterprise Linux 6 and 7. \n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, noarch, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64\n\n3. Description:\n\nThe Network Time Protocol (NTP) is used to synchronize a computer\u0027s time\nwith a referenced time source. \n\nIt was discovered that ntpd as a client did not correctly check the\noriginate timestamp in received packets. A remote attacker could use this\nflaw to send a crafted packet to an ntpd client that would effectively\ndisable synchronization with the server, or push arbitrary offset/delay\nmeasurements to modify the time on the client. (CVE-2015-8138)\n\nAll ntp users are advised to upgrade to these updated packages, which\ncontain a backported patch to resolve this issue. After installing the\nupdate, the ntpd daemon will restart automatically. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1299442 - CVE-2015-8138 ntp: missing check for zero originate timestamp\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nntp-4.2.6p5-5.el6_7.4.src.rpm\n\ni386:\nntp-4.2.6p5-5.el6_7.4.i686.rpm\nntp-debuginfo-4.2.6p5-5.el6_7.4.i686.rpm\nntpdate-4.2.6p5-5.el6_7.4.i686.rpm\n\nx86_64:\nntp-4.2.6p5-5.el6_7.4.x86_64.rpm\nntp-debuginfo-4.2.6p5-5.el6_7.4.x86_64.rpm\nntpdate-4.2.6p5-5.el6_7.4.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\ni386:\nntp-debuginfo-4.2.6p5-5.el6_7.4.i686.rpm\nntp-perl-4.2.6p5-5.el6_7.4.i686.rpm\n\nnoarch:\nntp-doc-4.2.6p5-5.el6_7.4.noarch.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-5.el6_7.4.x86_64.rpm\nntp-perl-4.2.6p5-5.el6_7.4.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nntp-4.2.6p5-5.el6_7.4.src.rpm\n\nx86_64:\nntp-4.2.6p5-5.el6_7.4.x86_64.rpm\nntp-debuginfo-4.2.6p5-5.el6_7.4.x86_64.rpm\nntpdate-4.2.6p5-5.el6_7.4.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nnoarch:\nntp-doc-4.2.6p5-5.el6_7.4.noarch.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-5.el6_7.4.x86_64.rpm\nntp-perl-4.2.6p5-5.el6_7.4.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nntp-4.2.6p5-5.el6_7.4.src.rpm\n\ni386:\nntp-4.2.6p5-5.el6_7.4.i686.rpm\nntp-debuginfo-4.2.6p5-5.el6_7.4.i686.rpm\nntpdate-4.2.6p5-5.el6_7.4.i686.rpm\n\nppc64:\nntp-4.2.6p5-5.el6_7.4.ppc64.rpm\nntp-debuginfo-4.2.6p5-5.el6_7.4.ppc64.rpm\nntpdate-4.2.6p5-5.el6_7.4.ppc64.rpm\n\ns390x:\nntp-4.2.6p5-5.el6_7.4.s390x.rpm\nntp-debuginfo-4.2.6p5-5.el6_7.4.s390x.rpm\nntpdate-4.2.6p5-5.el6_7.4.s390x.rpm\n\nx86_64:\nntp-4.2.6p5-5.el6_7.4.x86_64.rpm\nntp-debuginfo-4.2.6p5-5.el6_7.4.x86_64.rpm\nntpdate-4.2.6p5-5.el6_7.4.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\ni386:\nntp-debuginfo-4.2.6p5-5.el6_7.4.i686.rpm\nntp-perl-4.2.6p5-5.el6_7.4.i686.rpm\n\nnoarch:\nntp-doc-4.2.6p5-5.el6_7.4.noarch.rpm\n\nppc64:\nntp-debuginfo-4.2.6p5-5.el6_7.4.ppc64.rpm\nntp-perl-4.2.6p5-5.el6_7.4.ppc64.rpm\n\ns390x:\nntp-debuginfo-4.2.6p5-5.el6_7.4.s390x.rpm\nntp-perl-4.2.6p5-5.el6_7.4.s390x.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-5.el6_7.4.x86_64.rpm\nntp-perl-4.2.6p5-5.el6_7.4.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nntp-4.2.6p5-5.el6_7.4.src.rpm\n\ni386:\nntp-4.2.6p5-5.el6_7.4.i686.rpm\nntp-debuginfo-4.2.6p5-5.el6_7.4.i686.rpm\nntpdate-4.2.6p5-5.el6_7.4.i686.rpm\n\nx86_64:\nntp-4.2.6p5-5.el6_7.4.x86_64.rpm\nntp-debuginfo-4.2.6p5-5.el6_7.4.x86_64.rpm\nntpdate-4.2.6p5-5.el6_7.4.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\ni386:\nntp-debuginfo-4.2.6p5-5.el6_7.4.i686.rpm\nntp-perl-4.2.6p5-5.el6_7.4.i686.rpm\n\nnoarch:\nntp-doc-4.2.6p5-5.el6_7.4.noarch.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-5.el6_7.4.x86_64.rpm\nntp-perl-4.2.6p5-5.el6_7.4.x86_64.rpm\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nntp-4.2.6p5-22.el7_2.1.src.rpm\n\nx86_64:\nntp-4.2.6p5-22.el7_2.1.x86_64.rpm\nntp-debuginfo-4.2.6p5-22.el7_2.1.x86_64.rpm\nntpdate-4.2.6p5-22.el7_2.1.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nnoarch:\nntp-doc-4.2.6p5-22.el7_2.1.noarch.rpm\nntp-perl-4.2.6p5-22.el7_2.1.noarch.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-22.el7_2.1.x86_64.rpm\nsntp-4.2.6p5-22.el7_2.1.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nntp-4.2.6p5-22.el7_2.1.src.rpm\n\nx86_64:\nntp-4.2.6p5-22.el7_2.1.x86_64.rpm\nntp-debuginfo-4.2.6p5-22.el7_2.1.x86_64.rpm\nntpdate-4.2.6p5-22.el7_2.1.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nnoarch:\nntp-doc-4.2.6p5-22.el7_2.1.noarch.rpm\nntp-perl-4.2.6p5-22.el7_2.1.noarch.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-22.el7_2.1.x86_64.rpm\nsntp-4.2.6p5-22.el7_2.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nntp-4.2.6p5-22.el7_2.1.src.rpm\n\nppc64:\nntp-4.2.6p5-22.el7_2.1.ppc64.rpm\nntp-debuginfo-4.2.6p5-22.el7_2.1.ppc64.rpm\nntpdate-4.2.6p5-22.el7_2.1.ppc64.rpm\n\nppc64le:\nntp-4.2.6p5-22.el7_2.1.ppc64le.rpm\nntp-debuginfo-4.2.6p5-22.el7_2.1.ppc64le.rpm\nntpdate-4.2.6p5-22.el7_2.1.ppc64le.rpm\n\ns390x:\nntp-4.2.6p5-22.el7_2.1.s390x.rpm\nntp-debuginfo-4.2.6p5-22.el7_2.1.s390x.rpm\nntpdate-4.2.6p5-22.el7_2.1.s390x.rpm\n\nx86_64:\nntp-4.2.6p5-22.el7_2.1.x86_64.rpm\nntp-debuginfo-4.2.6p5-22.el7_2.1.x86_64.rpm\nntpdate-4.2.6p5-22.el7_2.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nnoarch:\nntp-doc-4.2.6p5-22.el7_2.1.noarch.rpm\nntp-perl-4.2.6p5-22.el7_2.1.noarch.rpm\n\nppc64:\nntp-debuginfo-4.2.6p5-22.el7_2.1.ppc64.rpm\nsntp-4.2.6p5-22.el7_2.1.ppc64.rpm\n\nppc64le:\nntp-debuginfo-4.2.6p5-22.el7_2.1.ppc64le.rpm\nsntp-4.2.6p5-22.el7_2.1.ppc64le.rpm\n\ns390x:\nntp-debuginfo-4.2.6p5-22.el7_2.1.s390x.rpm\nsntp-4.2.6p5-22.el7_2.1.s390x.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-22.el7_2.1.x86_64.rpm\nsntp-4.2.6p5-22.el7_2.1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nntp-4.2.6p5-22.el7_2.1.src.rpm\n\nx86_64:\nntp-4.2.6p5-22.el7_2.1.x86_64.rpm\nntp-debuginfo-4.2.6p5-22.el7_2.1.x86_64.rpm\nntpdate-4.2.6p5-22.el7_2.1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nnoarch:\nntp-doc-4.2.6p5-22.el7_2.1.noarch.rpm\nntp-perl-4.2.6p5-22.el7_2.1.noarch.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-22.el7_2.1.x86_64.rpm\nsntp-4.2.6p5-22.el7_2.1.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2015-8138\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2016 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFWpijmXlSAg2UNWIIRAlKDAJ9cuPIz/2ne6I5rsDoKlg2rFxFKlQCbBhEi\nh+3u/C5uuGO6PsIJukpD32I=\n=Osu4\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n\nReferences:\n\n - CVE-2015-7973 - ntp\n - CVE-2015-7974 - ntp\n - CVE-2015-7975 - ntp\n - CVE-2015-7979 - ntp\n - CVE-2015-8138 - ntp\n - CVE-2015-8158 - ntp\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n\nCVE-2016-2518\n\n Yihan Lian discovered that an OOB memory access could potentially\n crash ntpd. \n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 1:4.2.6.p5+dfsg-7+deb8u2. \n\nFor the testing distribution (stretch), these problems have been fixed\nin version 1:4.2.8p7+dfsg-1. \n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 1:4.2.8p7+dfsg-1. \n\nWe recommend that you upgrade your ntp packages. \nCorrected: 2016-01-22 15:55:21 UTC (stable/10, 10.2-STABLE)\n 2016-01-27 07:41:31 UTC (releng/10.2, 10.2-RELEASE-p11)\n 2016-01-27 07:41:31 UTC (releng/10.1, 10.1-RELEASE-p28)\n 2016-01-22 15:56:35 UTC (stable/9, 9.3-STABLE)\n 2016-01-27 07:42:11 UTC (releng/9.3, 9.3-RELEASE-p35)\nCVE Name: CVE-2015-7973, CVE-2015-7974, CVE-2015-7975, CVE-2015-7976,\n CVE-2015-7977, CVE-2015-7978, CVE-2015-7979, CVE-2015-8138,\n CVE-2015-8139, CVE-2015-8140, CVE-2015-8158\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit \u003cURL:https://security.FreeBSD.org/\u003e. \n\nII. Problem Description\n\nMultiple vulnerabilities have been discovered in ntp 4.2.8p5:\n\nPotential Infinite Loop in ntpq. [CVE-2015-8138]\n\nOff-path Denial of Service (DoS) attack on authenticated broadcast mode. \n[CVE-2015-7979]\n\nStack exhaustion in recursive traversal of restriction list. [CVE-2015-7978]\n\nreslist NULL pointer dereference. [CVE-2015-7977]\n\nntpq saveconfig command allows dangerous characters in filenames. \n[CVE-2015-7976]\n\nnextvar() missing length check. [CVE-2015-7975]\n\nSkeleton Key: Missing key check allows impersonation between authenticated\npeers. [CVE-2015-7974]\n\nDeja Vu: Replay attack on authenticated broadcast mode. [CVE-2015-7973]\n\nntpq vulnerable to replay attacks. [CVE-2015-8140]\n\nOrigin Leak: ntpq and ntpdc, disclose origin. [CVE-2015-8139]\n\nIII. Impact\n\nA malicious NTP server, or an attacker who can conduct MITM attack by\nintercepting NTP query traffic, may be able to cause a ntpq client to\ninfinitely loop. [CVE-2015-8158]\n\nA malicious NTP server, or an attacker who can conduct MITM attack by\nintercepting NTP query traffic, may be able to prevent a ntpd(8) daemon\nto distinguish between legitimate peer responses from forgeries. This\ncan partially be mitigated by configuring multiple time sources. \n[CVE-2015-8138]\n\nAn off-path attacker who can send broadcast packets with bad\nauthentication (wrong key, mismatched key, incorrect MAC, etc) to\nbroadcast clients can cause these clients to tear down associations. \n[CVE-2015-7979]\n\nAn attacker who can send unauthenticated \u0027reslist\u0027 command to a NTP\nserver may cause it to crash, resulting in a denial of service\ncondition due to stack exhaustion [CVE-2015-7978] or a NULL pointer\ndereference [CVE-2015-7977]. \n\nAn attacker who can send \u0027modify\u0027 requests to a NTP server may be\nable to create file that contain dangerous characters in their name,\nwhich could cause dangerous behavior in a later shell invocation. \n[CVE-2015-7976] \n\nA remote attacker may be able to crash a ntpq client. [CVE-2015-7975]\n\nA malicious server which holds a trusted key may be able to\nimpersonate other trusted servers in an authenticated configuration. \n[CVE-2015-7974]\n\nA man-in-the-middle attacker or a malicious participant that has the\nsame trusted keys as the victim can replay time packets if the NTP\nnetwork is configured for broadcast operations. [CVE-2015-7973]\n\nThe ntpq protocol is vulnerable to replay attacks which may be used\nto e.g. re-establish an association to malicious server. [CVE-2015-8140]\n\nAn attacker who can intercept NTP traffic can easily forge live server\nresponses. [CVE-2015-8139]\n\nIV. Workaround\n\nNo workaround is available, but systems not running ntpd(8) are not\naffected. Network administrators are advised to implement BCP-38,\nwhich helps to reduce risk associated with the attacks. \n\nV. Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to a supported FreeBSD stable or\nrelease / security branch (releng) dated after the correction date. A reboot is\nrecommended but not required. \n\n2) To update your vulnerable system via a binary patch:\n\nSystems running a RELEASE version of FreeBSD on the i386 or amd64\nplatforms can be updated via the freebsd-update(8) utility:\n\n# freebsd-update fetch\n# freebsd-update install\n\nThe ntpd service has to be restarted after the update. A reboot is\nrecommended but not required. \n\n3) To update your vulnerable system via a source code patch:\n\nThe following patches have been verified to apply to the applicable\nFreeBSD release branches. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n# fetch https://security.FreeBSD.org/patches/SA-16:09/ntp.patch\n# fetch https://security.FreeBSD.org/patches/SA-16:09/ntp.patch.asc\n# gpg --verify ntp.patch.asc\n\nb) Apply the patch. Execute the following commands as root:\n\n# cd /usr/src\n# patch \u003c /path/to/patch\n\nc) Recompile the operating system using buildworld and installworld as\ndescribed in \u003cURL:https://www.FreeBSD.org/handbook/makeworld.html\u003e. \n\nRestart the applicable daemons, or reboot the system. \n\nVI. Correction details\n\nThe following list contains the correction revision numbers for each\naffected branch. \n\nBranch/path Revision\n- -------------------------------------------------------------------------\nstable/9/ r294570\nreleng/9.3/ r294905\nstable/10/ r294569\nreleng/10.1/ r294904\nreleng/10.2/ r294904\n- -------------------------------------------------------------------------\n\nTo see which files were modified by a particular revision, run the\nfollowing command, replacing NNNNNN with the revision number, on a\nmachine with Subversion installed:\n\n# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base\n\nOr visit the following URL, replacing NNNNNN with the revision number:\n\n\u003cURL:https://svnweb.freebsd.org/base?view=revision\u0026revision=NNNNNN\u003e\n\nVII", "sources": [ { "db": "NVD", "id": "CVE-2015-8138" }, { "db": "CERT/CC", "id": "VU#718152" }, { "db": "JVNDB", "id": "JVNDB-2015-007359" }, { "db": "BID", "id": "81811" }, { "db": "VULMON", "id": "CVE-2015-8138" }, { "db": "PACKETSTORM", "id": "138984" }, { "db": "PACKETSTORM", "id": "142689" }, { "db": "PACKETSTORM", "id": "135914" }, { "db": "PACKETSTORM", "id": "137992" }, { "db": "PACKETSTORM", "id": "135358" }, { "db": "PACKETSTORM", "id": "136864" }, { "db": "PACKETSTORM", "id": "143414" }, { "db": "PACKETSTORM", "id": "138052" }, { "db": "PACKETSTORM", "id": "135401" } ], "trust": 3.51 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-8138", "trust": 3.7 }, { "db": "CERT/CC", "id": "VU#718152", "trust": 3.6 }, { "db": "BID", "id": "81811", "trust": 2.0 }, { "db": "SIEMENS", "id": "SSA-497656", "trust": 1.7 }, { "db": "SIEMENS", "id": "SSA-211752", "trust": 1.7 }, { "db": "ICS CERT", "id": "ICSA-21-103-11", "trust": 1.7 }, { "db": "SECTRACK", "id": "1034782", "trust": 1.7 }, { "db": "JVN", "id": "JVNVU95781418", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU96269392", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU91176422", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-007359", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-21-159-11", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021061008", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201601-668", "trust": 0.6 }, { "db": "JUNIPER", "id": "JSA10776", "trust": 0.3 }, { "db": "TALOS", "id": "TALOS-2016-0077", "trust": 0.3 }, { "db": "VULMON", "id": "CVE-2015-8138", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "138984", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "142689", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "135914", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "137992", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "135358", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "136864", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "143414", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "138052", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "135401", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#718152" }, { "db": "VULMON", "id": "CVE-2015-8138" }, { "db": "BID", "id": "81811" }, { "db": "JVNDB", "id": "JVNDB-2015-007359" }, { "db": "PACKETSTORM", "id": "138984" }, { "db": "PACKETSTORM", "id": "142689" }, { "db": "PACKETSTORM", "id": "135914" }, { "db": "PACKETSTORM", "id": "137992" }, { "db": "PACKETSTORM", "id": "135358" }, { "db": "PACKETSTORM", "id": "136864" }, { "db": "PACKETSTORM", "id": "143414" }, { "db": "PACKETSTORM", "id": "138052" }, { "db": "PACKETSTORM", "id": "135401" }, { "db": "CNNVD", "id": "CNNVD-201601-668" }, { "db": "NVD", "id": "CVE-2015-8138" } ] }, "id": "VAR-201701-1135", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.365299625 }, "last_update_date": "2024-11-29T20:00:23.071000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "RHSA-2016", "trust": 0.8, "url": "http://support.ntp.org/bin/view/Main/NtpBug2945" }, { "title": "NTP Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=147385" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2016/10/28/researchers_tag_new_brace_of_bugs_in_ntp_but_theyre_fixable/" }, { "title": "Red Hat: CVE-2015-8138", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2015-8138" }, { "title": "Brocade Security Advisories: BSA-2017-257", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=brocade_security_advisories\u0026qid=f9a3761f4e4c3763091ffa2496cb5def" }, { "title": "Amazon Linux AMI: ALAS-2016-649", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2016-649" }, { "title": "Ubuntu Security Notice: ntp vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3096-1" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=e70fe4cd19746222a97e5da53d3d2b2a" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=85311fa037162a48cd67fd63f52a6478" }, { "title": "Symantec Security Advisories: SA113 : January 2016 NTP Security Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories\u0026qid=1a84824eac476a84dbbcf797d2d35a1f" }, { "title": "Cisco: Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: January 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20160127-ntpd" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - July 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=3a04485ebb79f7fbc2472bf9af5ce489" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - April 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=976a4da35d55283870dbb31b88a6c655" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - January 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=eb439566c9130adc92d21bc093204cf8" }, { "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - January 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=8ad80411af3e936eb2998df70506cc71" }, { "title": "satellite-host-cve", "trust": 0.1, "url": "https://github.com/RedHatSatellite/satellite-host-cve " } ], "sources": [ { "db": "VULMON", "id": "CVE-2015-8138" }, { "db": "JVNDB", "id": "JVNDB-2015-007359" }, { "db": "CNNVD", "id": "CNNVD-201601-668" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.0 }, { "problemtype": "Incorrect input confirmation (CWE-20) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-007359" }, { "db": "NVD", "id": "CVE-2015-8138" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "https://www.kb.cert.org/vuls/id/718152" }, { "trust": 2.5, "url": "http://support.ntp.org/bin/view/main/securitynotice#april_2016_ntp_4_2_8p7_security" }, { "trust": 2.3, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11" }, { "trust": 2.0, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160428-ntpd" }, { "trust": 1.8, "url": "https://security.gentoo.org/glsa/201607-15" }, { "trust": 1.8, "url": "http://www.ubuntu.com/usn/usn-3096-1" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/81811" }, { "trust": 1.8, "url": "http://rhn.redhat.com/errata/rhsa-2016-0063.html" }, { "trust": 1.7, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20161123-ntpd" }, { "trust": 1.7, "url": "https://bto.bluecoat.com/security-advisory/sa113" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1034782" }, { "trust": 1.7, "url": "http://www.debian.org/security/2016/dsa-3629" }, { "trust": 1.7, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160127-ntpd" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" }, { "trust": 1.7, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-january/176434.html" }, { "trust": 1.7, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-february/177507.html" }, { "trust": 1.7, "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "trust": 1.7, "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03750en_us" }, { "trust": 1.7, "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03766en_us" }, { "trust": 1.7, "url": "https://security.netapp.com/advisory/ntap-20171031-0001/" }, { "trust": 1.7, "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "trust": 1.7, "url": "https://security.freebsd.org/advisories/freebsd-sa-16:09.ntp.asc" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "trust": 1.6, "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19" }, { "trust": 1.1, "url": "http://support.ntp.org/bin/view/main/securitynotice#january_2016_ntp_4_2_8p6_securit" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu91176422/" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu96269392/index.html" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu95781418/index.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-8138" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8138" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7974" }, { "trust": 0.6, "url": "http://support.ntp.org/bin/view/main/ntpbug2945" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7973" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7979" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7975" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8158" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021061008" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-159-11" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7978" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1547" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7977" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7976" }, { "trust": 0.3, "url": "http://www.talosintel.com/reports/talos-2016-0077/" }, { "trust": 0.3, "url": "http://www.ntp.org" }, { "trust": 0.3, "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "trust": 0.3, "url": "https://www.freebsd.org/security/advisories/freebsd-sa-16:09.ntp.asc" }, { "trust": 0.3, "url": "isg3t1023874" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1024073" }, { "trust": 0.3, "url": "https://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10776\u0026cat=sirt_1\u0026actp=list" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5099470" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1023874" }, { "trust": 0.3, "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5099425" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005821" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21979393" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21980676" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21983501" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21983506" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8n1021264" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1548" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2516" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1550" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2518" }, { "trust": 0.2, "url": "http://www.hpe.com/support/security_bulletin_archive" }, { "trust": 0.2, "url": "https://www.hpe.com/info/report-security-vulnerability" }, { "trust": 0.2, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499" }, { "trust": 0.2, "url": "http://www.hpe.com/support/subscriber_choice" }, { "trust": 0.2, "url": "http://slackware.com" }, { "trust": 0.2, "url": "http://slackware.com/gpg-key" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8138" }, { "trust": 0.2, "url": "http://osuosl.org)" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7704" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.theregister.co.uk/2016/10/28/researchers_tag_new_brace_of_bugs_in_ntp_but_theyre_fixable/" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/3096-1/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4956" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0727" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4954" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/ntp/1:4.2.6.p5+dfsg-3ubuntu2.14.04.10" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4955" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/ntp/1:4.2.6.p3+dfsg-1ubuntu3.11" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/ntp/1:4.2.8p4+dfsg-3ubuntu5.3" }, { "trust": 0.1, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbhf03750en_us" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8158" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5300" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7979" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7975" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7974" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5300" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7976" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7973" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7978" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7977" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7871" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7702" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7705" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1549" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7702" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7849" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7852" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7978" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8140" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7855" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7852" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1551" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2516" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7975" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7848" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8139" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8158" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4954" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4956" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7973" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7853" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7701" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7704" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8140" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7691" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8139" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4957" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7703" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7855" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4955" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7849" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7854" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7703" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7705" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2517" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1548" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7691" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1547" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7854" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7853" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2519" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2518" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7851" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7692" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7871" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7977" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7848" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1550" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7850" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7850" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7701" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7692" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8138" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7979" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7974" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7851" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4953" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7976" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-8138" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2516" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7704" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1551" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2519" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2517" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2519" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1547" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2518" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1549" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1551" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1550" }, { "trust": 0.1, "url": "http://support.ntp.org/bin/view/main/securitynotice#recent_vulnerabilities" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2517" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1548" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1549" }, { "trust": 0.1, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbhf03766en_us" }, { "trust": 0.1, "url": "http://h20565.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-a00006123en_" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://security.freebsd.org/advisories/freebsd-sa-16:09.ntp.asc\u003e" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?cve-2015-7975\u003e" }, { "trust": 0.1, "url": "https://svnweb.freebsd.org/base?view=revision\u0026revision=nnnnnn\u003e" }, { "trust": 0.1, "url": "https://security.freebsd.org/patches/sa-16:09/ntp.patch.asc" }, { "trust": 0.1, "url": "https://security.freebsd.org/patches/sa-16:09/ntp.patch" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?cve-2015-7977\u003e" }, { "trust": 0.1, "url": "http://support.ntp.org/bin/view/main/securitynotice#january_2016_ntp_4_2_8p6_securit\u003e" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?cve-2015-8138\u003e" }, { "trust": 0.1, "url": "https://security.freebsd.org/\u003e." }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?cve-2015-7976\u003e" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?cve-2015-7974\u003e" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?cve-2015-8158\u003e" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?cve-2015-7978\u003e" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?cve-2015-8140\u003e" }, { "trust": 0.1, "url": "https://www.freebsd.org/handbook/makeworld.html\u003e." }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?cve-2015-7973\u003e" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?cve-2015-8139\u003e" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?cve-2015-7979\u003e" } ], "sources": [ { "db": "CERT/CC", "id": "VU#718152" }, { "db": "VULMON", "id": "CVE-2015-8138" }, { "db": "BID", "id": "81811" }, { "db": "JVNDB", "id": "JVNDB-2015-007359" }, { "db": "PACKETSTORM", "id": "138984" }, { "db": "PACKETSTORM", "id": "142689" }, { "db": "PACKETSTORM", "id": "135914" }, { "db": "PACKETSTORM", "id": "137992" }, { "db": "PACKETSTORM", "id": "135358" }, { "db": "PACKETSTORM", "id": "136864" }, { "db": "PACKETSTORM", "id": "143414" }, { "db": "PACKETSTORM", "id": "138052" }, { "db": "PACKETSTORM", "id": "135401" }, { "db": "CNNVD", "id": "CNNVD-201601-668" }, { "db": "NVD", "id": "CVE-2015-8138" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#718152" }, { "db": "VULMON", "id": "CVE-2015-8138" }, { "db": "BID", "id": "81811" }, { "db": "JVNDB", "id": "JVNDB-2015-007359" }, { "db": "PACKETSTORM", "id": "138984" }, { "db": "PACKETSTORM", "id": "142689" }, { "db": "PACKETSTORM", "id": "135914" }, { "db": "PACKETSTORM", "id": "137992" }, { "db": "PACKETSTORM", "id": "135358" }, { "db": "PACKETSTORM", "id": "136864" }, { "db": "PACKETSTORM", "id": "143414" }, { "db": "PACKETSTORM", "id": "138052" }, { "db": "PACKETSTORM", "id": "135401" }, { "db": "CNNVD", "id": "CNNVD-201601-668" }, { "db": "NVD", "id": "CVE-2015-8138" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-04-27T00:00:00", "db": "CERT/CC", "id": "VU#718152" }, { "date": "2017-01-30T00:00:00", "db": "VULMON", "id": "CVE-2015-8138" }, { "date": "2016-01-20T00:00:00", "db": "BID", "id": "81811" }, { "date": "2017-02-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007359" }, { "date": "2016-10-05T22:33:00", "db": "PACKETSTORM", "id": "138984" }, { "date": "2017-05-26T13:25:15", "db": "PACKETSTORM", "id": "142689" }, { "date": "2016-02-25T00:00:21", "db": "PACKETSTORM", "id": "135914" }, { "date": "2016-07-21T15:56:23", "db": "PACKETSTORM", "id": "137992" }, { "date": "2016-01-25T16:56:39", "db": "PACKETSTORM", "id": "135358" }, { "date": "2016-05-02T21:38:58", "db": "PACKETSTORM", "id": "136864" }, { "date": "2017-07-20T22:22:00", "db": "PACKETSTORM", "id": "143414" }, { "date": "2016-07-26T19:19:00", "db": "PACKETSTORM", "id": "138052" }, { "date": "2016-01-27T17:24:36", "db": "PACKETSTORM", "id": "135401" }, { "date": "2016-01-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201601-668" }, { "date": "2017-01-30T21:59:00.723000", "db": "NVD", "id": "CVE-2015-8138" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-04-28T00:00:00", "db": "CERT/CC", "id": "VU#718152" }, { "date": "2021-06-08T00:00:00", "db": "VULMON", "id": "CVE-2015-8138" }, { "date": "2017-05-02T01:08:00", "db": "BID", "id": "81811" }, { "date": "2021-06-10T08:55:00", "db": "JVNDB", "id": "JVNDB-2015-007359" }, { "date": "2021-11-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201601-668" }, { "date": "2024-11-21T02:38:03.397000", "db": "NVD", "id": "CVE-2015-8138" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "138984" }, { "db": "PACKETSTORM", "id": "135358" }, { "db": "CNNVD", "id": "CNNVD-201601-668" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "NTP.org ntpd contains multiple vulnerabilities", "sources": [ { "db": "CERT/CC", "id": "VU#718152" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201601-668" } ], "trust": 0.6 } }
CERTFR-2022-AVI-124
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Système affecté | Lien vers l'avis éditeur |
---|---|
Advantage Navigator Energy & Sustainability | Lien |
Advantage Navigator Software Proxy V6 | Lien |
Building Operator Discovery Distribution for the Connect X200 Gateway | Lien |
Building Operator Discovery Distribution for the Connect X300 Gateway | Lien |
Building Twin - 360° Viewer | Lien |
Capital | Lien |
Cerberus DMS | Lien |
CloudConnect 712 | Lien |
COMOS | Lien |
COMOS V10.2 | Lien |
COMOS V10.3 | Lien |
COMOS V10.4 | Lien |
cRSP Operator Client Starter | Lien |
cRSP | Lien |
Desigo CC | Lien |
Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200 | Lien |
E-Car OC Cloud Application | Lien |
Energy Engage | Lien |
EnergyIP Prepay V3.7 | Lien |
EnergyIP Prepay V3.8 | Lien |
EnergyIP | Lien |
Enlighted Amaze | Lien |
Enlighted Where | Lien |
Geolus Shape Search V10 | Lien |
Geolus Shape Search V11 | Lien |
GMA-Manager | Lien |
HEEDS Connect | Lien |
HES UDIS | Lien |
IE/AS-i Link PN IO | Lien |
IE/PB-Link (incl. SIPLUS NET variants) | Lien |
IE/PB LINK PN IO (incl. SIPLUS NET variants) | Lien |
Industrial Edge Hub | Lien |
Industrial Edge Management App (IEM-App) | Lien |
Industrial Edge Management OS (IEM-OS) | Lien |
jROS for Spectrum Power 4 | Lien |
jROS for Spectrum Power 7 | Lien |
JT2Go | Lien |
KTK ATE530S | Lien |
LOGO! CMR2020 | Lien |
LOGO! CMR2040 | Lien |
Mendix Applications | Lien |
MindSphere App Management Cockpits (Developer& Operator) | Lien |
MindSphere Asset Manager | Lien |
Mindsphere Cloud Foundry | Lien |
Mindsphere Cloud Platform | Lien |
MindSphere IAM (User Management/ Settings) | Lien |
MindSphere Integrated Data Lake | Lien |
MindSphere Notification Service | Lien |
MindSphere Predictive Learning | Lien |
MindSphere Usage Transparency Service | Lien |
MindSphere Visual Explorer | Lien |
NXpower Monitor | Lien |
NX | Lien |
Opcenter EX CP Process Automation Control | Lien |
Opcenter Execution Core Process Automation Control | Lien |
Opcenter Intelligence | Lien |
Operation Scheduler | Lien |
PROFINET Driver for Controller | Lien |
PSS(R)CAPE | Lien |
RFID 181EIP | Lien |
ROX II | Lien |
RUGGEDCOM APE1404 Linux | Lien |
RUGGEDCOM CROSSBOW Station Access Controller | Lien |
RUGGEDCOM RCM1224 | Lien |
RUGGEDCOM RM1224 LTE(4G) EU | Lien |
RUGGEDCOM RM1224 LTE(4G) EU | Lien |
RUGGEDCOM RM1224 LTE(4G) NAM | Lien |
RUGGEDCOM RM1224 LTE(4G) NAM | Lien |
RUGGEDCOM RM1224 | Lien |
RUGGEDCOM RM1224 | Lien |
RUGGEDCOM RM1224 | Lien |
RUGGEDCOM ROX MX5000RE | Lien |
RUGGEDCOM ROX MX5000 | Lien |
RUGGEDCOM ROX RX1400 | Lien |
RUGGEDCOM ROX RX1500 | Lien |
RUGGEDCOM ROX RX1501 | Lien |
RUGGEDCOM ROX RX1510 | Lien |
RUGGEDCOM ROX RX1511 | Lien |
RUGGEDCOM ROX RX1512 | Lien |
RUGGEDCOM ROX RX1524 | Lien |
RUGGEDCOM ROX RX1536 | Lien |
RUGGEDCOM ROX RX5000 | Lien |
RUGGEDCOM RX1400 VPE Debian Linux | Lien |
RUGGEDCOM RX1400 VPE Linux CloudConnect | Lien |
SCALANCE LPE9403 | Lien |
SCALANCE M-800 / S615 | Lien |
SCALANCE M-800 | Lien |
SCALANCE M804PB | Lien |
SCALANCE M804PB | Lien |
SCALANCE M804PB | Lien |
SCALANCE M804PB | Lien |
SCALANCE M804PB | Lien |
SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
SCALANCE M812-1 ADSL-Router (Annex A) | Lien |
SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
SCALANCE M812-1 ADSL-Router (Annex B) | Lien |
SCALANCE M812-1 ADSL-Router | Lien |
SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
SCALANCE M816-1 ADSL-Router (Annex A) | Lien |
SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
SCALANCE M816-1 ADSL-Router (Annex B) | Lien |
SCALANCE M816-1 ADSL-Router | Lien |
SCALANCE M826-2 SHDSL-Router | Lien |
SCALANCE M826-2 SHDSL-Router | Lien |
SCALANCE M826-2 SHDSL-Router | Lien |
SCALANCE M826-2 SHDSL-Router | Lien |
SCALANCE M826-2 SHDSL-Router | Lien |
SCALANCE M874-2 | Lien |
SCALANCE M874-2 | Lien |
SCALANCE M874-2 | Lien |
SCALANCE M874-2 | Lien |
SCALANCE M874-2 | Lien |
SCALANCE M874-3 | Lien |
SCALANCE M874-3 | Lien |
SCALANCE M874-3 | Lien |
SCALANCE M874-3 | Lien |
SCALANCE M874-3 | Lien |
SCALANCE M875 | Lien |
SCALANCE M876-3 (ROK) | Lien |
SCALANCE M876-3 (ROK) | Lien |
SCALANCE M876-3 (ROK) | Lien |
SCALANCE M876-3 (ROK) | Lien |
SCALANCE M876-3 (ROK) | Lien |
SCALANCE M876-3 | Lien |
SCALANCE M876-3 | Lien |
SCALANCE M876-3 | Lien |
SCALANCE M876-3 | Lien |
SCALANCE M876-3 | Lien |
SCALANCE M876-4 (EU) | Lien |
SCALANCE M876-4 (EU) | Lien |
SCALANCE M876-4 (EU) | Lien |
SCALANCE M876-4 (EU) | Lien |
SCALANCE M876-4 (EU) | Lien |
SCALANCE M876-4 (NAM) | Lien |
SCALANCE M876-4 (NAM) | Lien |
SCALANCE M876-4 (NAM) | Lien |
SCALANCE M876-4 (NAM) | Lien |
SCALANCE M876-4 (NAM) | Lien |
SCALANCE MUM856-1 (EU) | Lien |
SCALANCE MUM856-1 (EU) | Lien |
SCALANCE MUM856-1 (RoW) | Lien |
SCALANCE MUM856-1 (RoW) | Lien |
SCALANCE S602 | Lien |
SCALANCE S602 | Lien |
SCALANCE S602 | Lien |
SCALANCE S612 | Lien |
SCALANCE S612 | Lien |
SCALANCE S612 | Lien |
SCALANCE S615 | Lien |
SCALANCE S615 | Lien |
SCALANCE S615 | Lien |
SCALANCE S615 | Lien |
SCALANCE S615 | Lien |
SCALANCE S623 | Lien |
SCALANCE S623 | Lien |
SCALANCE S623 | Lien |
SCALANCE S627-2M | Lien |
SCALANCE S627-2M | Lien |
SCALANCE S627-2M | Lien |
SCALANCE SC622-2C | Lien |
SCALANCE SC622-2C | Lien |
SCALANCE SC622-2C | Lien |
SCALANCE SC622-2C | Lien |
SCALANCE SC632-2C | Lien |
SCALANCE SC632-2C | Lien |
SCALANCE SC632-2C | Lien |
SCALANCE SC632-2C | Lien |
SCALANCE SC636-2C | Lien |
SCALANCE SC636-2C | Lien |
SCALANCE SC636-2C | Lien |
SCALANCE SC636-2C | Lien |
SCALANCE SC642-2C | Lien |
SCALANCE SC642-2C | Lien |
SCALANCE SC642-2C | Lien |
SCALANCE SC642-2C | Lien |
SCALANCE SC646-2C | Lien |
SCALANCE SC646-2C | Lien |
SCALANCE SC646-2C | Lien |
SCALANCE SC646-2C | Lien |
SCALANCE W-1700 IEEE 802.11ac family | Lien |
SCALANCE W-1700 IEEE 802.11ac family | Lien |
SCALANCE W-1700 IEEE 802.11ac family | Lien |
SCALANCE W1748-1 M12 | Lien |
SCALANCE W1748-1 M12 | Lien |
SCALANCE W1750D | Lien |
SCALANCE W1750D | Lien |
SCALANCE W1788-1 M12 | Lien |
SCALANCE W1788-1 M12 | Lien |
SCALANCE W1788-2 EEC M12 | Lien |
SCALANCE W1788-2 EEC M12 | Lien |
SCALANCE W1788-2IA M12 | Lien |
SCALANCE W1788-2IA M12 | Lien |
SCALANCE W1788-2 M12 | Lien |
SCALANCE W1788-2 M12 | Lien |
SCALANCE W-700 IEEE 802.11n family | Lien |
SCALANCE W-700 IEEE 802.11n family | Lien |
SCALANCE W-700 IEEE 802.11n family | Lien |
SCALANCE W-700 IEEE 802.11n family | Lien |
SCALANCE W700 | Lien |
SCALANCE W721-1 RJ45 | Lien |
SCALANCE W721-1 RJ45 | Lien |
SCALANCE W722-1 RJ45 | Lien |
SCALANCE W722-1 RJ45 | Lien |
SCALANCE W734-1 RJ45 | Lien |
SCALANCE W734-1 RJ45 | Lien |
SCALANCE W734-1 RJ45 (USA) | Lien |
SCALANCE W734-1 RJ45 (USA) | Lien |
SCALANCE W738-1 M12 | Lien |
SCALANCE W738-1 M12 | Lien |
SCALANCE W748-1 M12 | Lien |
SCALANCE W748-1 M12 | Lien |
SCALANCE W748-1 RJ45 | Lien |
SCALANCE W748-1 RJ45 | Lien |
SCALANCE W761-1 RJ45 | Lien |
SCALANCE W761-1 RJ45 | Lien |
SCALANCE W774-1 M12 EEC | Lien |
SCALANCE W774-1 M12 EEC | Lien |
SCALANCE W774-1 RJ45 | Lien |
SCALANCE W774-1 RJ45 | Lien |
SCALANCE W774-1 RJ45 (USA) | Lien |
SCALANCE W774-1 RJ45 (USA) | Lien |
SCALANCE W778-1 M12 EEC | Lien |
SCALANCE W778-1 M12 EEC | Lien |
SCALANCE W778-1 M12 EEC (USA) | Lien |
SCALANCE W778-1 M12 EEC (USA) | Lien |
SCALANCE W778-1 M12 | Lien |
SCALANCE W778-1 M12 | Lien |
SCALANCE W786-1 RJ45 | Lien |
SCALANCE W786-1 RJ45 | Lien |
SCALANCE W786-2IA RJ45 | Lien |
SCALANCE W786-2IA RJ45 | Lien |
SCALANCE W786-2 RJ45 | Lien |
SCALANCE W786-2 RJ45 | Lien |
SCALANCE W786-2 SFP | Lien |
SCALANCE W786-2 SFP | Lien |
SCALANCE W788-1 M12 | Lien |
SCALANCE W788-1 M12 | Lien |
SCALANCE W788-1 RJ45 | Lien |
SCALANCE W788-1 RJ45 | Lien |
SCALANCE W788-2 M12 EEC | Lien |
SCALANCE W788-2 M12 EEC | Lien |
SCALANCE W788-2 M12 | Lien |
SCALANCE W788-2 M12 | Lien |
SCALANCE W788-2 RJ45 | Lien |
SCALANCE W788-2 RJ45 | Lien |
SCALANCE WAM763-1 | Lien |
SCALANCE WAM766-1 6GHz | Lien |
SCALANCE WAM766-1 6GHz | Lien |
SCALANCE WAM766-1 EEC 6GHz | Lien |
SCALANCE WAM766-1 EEC 6GHz | Lien |
SCALANCE WAM766-1 EEC | Lien |
SCALANCE WAM766-1 EEC | Lien |
SCALANCE WAM766-1 | Lien |
SCALANCE WAM766-1 | Lien |
SCALANCE WLC711 | Lien |
SCALANCE WLC712 | Lien |
SCALANCE WUM763-1 | Lien |
SCALANCE WUM766-1 6GHz | Lien |
SCALANCE WUM766-1 6GHz | Lien |
SCALANCE WUM766-1 | Lien |
SCALANCE WUM766-1 | Lien |
SCALANCE X200-4 P IRT | Lien |
SCALANCE X200-4 P IRT | Lien |
SCALANCE X-200IRT (incl. SIPLUS NET variants) | Lien |
SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
SCALANCE X-200IRT switch family (incl. SIPLUS NET variants) | Lien |
SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
SCALANCE X-200 switch family (incl. SIPLUS NET variants) | Lien |
SCALANCE X201-3P IRT PRO | Lien |
SCALANCE X201-3P IRT PRO | Lien |
SCALANCE X201-3P IRT | Lien |
SCALANCE X201-3P IRT | Lien |
SCALANCE X202-2 IRT | Lien |
SCALANCE X202-2 IRT | Lien |
SCALANCE X202-2P IRT (incl. SIPLUS NET variant) | Lien |
SCALANCE X202-2P IRT (incl. SIPLUS NET variant) | Lien |
SCALANCE X202-2P IRT PRO | Lien |
SCALANCE X202-2P IRT PRO | Lien |
SCALANCE X204-2FM | Lien |
SCALANCE X204-2FM | Lien |
SCALANCE X204-2 (incl. SIPLUS NET variant) | Lien |
SCALANCE X204-2LD (incl. SIPLUS NET variant) | Lien |
SCALANCE X204-2LD | Lien |
SCALANCE X204-2LD TS | Lien |
SCALANCE X204-2LD TS | Lien |
SCALANCE X204-2 | Lien |
SCALANCE X204-2TS | Lien |
SCALANCE X204-2TS | Lien |
SCALANCE X204 IRT PRO | Lien |
SCALANCE X204 IRT PRO | Lien |
SCALANCE X204 IRT | Lien |
SCALANCE X204 IRT | Lien |
SCALANCE X204RNA EEC (HSR) | Lien |
SCALANCE X204RNA EEC (HSR) | Lien |
SCALANCE X204RNA EEC (PRP/HSR) | Lien |
SCALANCE X204RNA EEC (PRP/HSR) | Lien |
SCALANCE X204RNA EEC (PRP) | Lien |
SCALANCE X204RNA EEC (PRP) | Lien |
SCALANCE X204RNA (HSR) | Lien |
SCALANCE X204RNA (HSR) | Lien |
SCALANCE X204RNA (PRP) | Lien |
SCALANCE X204RNA (PRP) | Lien |
SCALANCE X206-1LD (incl. SIPLUS NET variant) | Lien |
SCALANCE X206-1LD | Lien |
SCALANCE X206-1 | Lien |
SCALANCE X206-1 | Lien |
SCALANCE X208 (incl. SIPLUS NET variant) | Lien |
SCALANCE X208PRO | Lien |
SCALANCE X208PRO | Lien |
SCALANCE X208 | Lien |
SCALANCE X212-2LD | Lien |
SCALANCE X212-2LD | Lien |
SCALANCE X212-2 | Lien |
SCALANCE X212-2 | Lien |
SCALANCE X216 | Lien |
SCALANCE X216 | Lien |
SCALANCE X224 | Lien |
SCALANCE X224 | Lien |
SCALANCE X-300 (incl. X408 and SIPLUS NET variants) | Lien |
SCALANCE X-300 switch family (incl. SIPLUS NET variants) | Lien |
SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) | Lien |
SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) | Lien |
SCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants) | Lien |
SCALANCE X302-7 EEC (230V coated) | Lien |
SCALANCE X302-7 EEC (230V) | Lien |
SCALANCE X302-7 EEC (24V coated) | Lien |
SCALANCE X302-7 EEC (24V) | Lien |
SCALANCE X302-7 EEC (2x 230V coated) | Lien |
SCALANCE X302-7 EEC (2x 230V) | Lien |
SCALANCE X302-7 EEC (2x 24V coated) | Lien |
SCALANCE X302-7 EEC (2x 24V) | Lien |
SCALANCE X302-7EEC | Lien |
SCALANCE X304-2FE | Lien |
SCALANCE X304-2FE | Lien |
SCALANCE X306-1LD FE | Lien |
SCALANCE X306-1LDFE | Lien |
SCALANCE X307-2 EEC (230V coated) | Lien |
SCALANCE X307-2 EEC (230V) | Lien |
SCALANCE X307-2 EEC (24V coated) | Lien |
SCALANCE X307-2 EEC (24V) | Lien |
SCALANCE X307-2 EEC (2x 230V coated) | Lien |
SCALANCE X307-2 EEC (2x 230V) | Lien |
SCALANCE X307-2 EEC (2x 24V coated) | Lien |
SCALANCE X307-2 EEC (2x 24V) | Lien |
SCALANCE X307-2EEC | Lien |
SCALANCE X307-3LD | Lien |
SCALANCE X307-3LD | Lien |
SCALANCE X307-3 | Lien |
SCALANCE X307-3 | Lien |
SCALANCE X308-2 (incl. SIPLUS NET variant) | Lien |
SCALANCE X308-2LD | Lien |
SCALANCE X308-2LD | Lien |
SCALANCE X308-2LH+ | Lien |
SCALANCE X308-2LH | Lien |
SCALANCE X308-2LH+ | Lien |
SCALANCE X308-2LH | Lien |
SCALANCE X308-2M PoE | Lien |
SCALANCE X308-2M PoE | Lien |
SCALANCE X308-2M | Lien |
SCALANCE X308-2M | Lien |
SCALANCE X308-2M TS | Lien |
SCALANCE X308-2M TS | Lien |
SCALANCE X308-2 | Lien |
SCALANCE X310FE | Lien |
SCALANCE X310FE | Lien |
SCALANCE X310 | Lien |
SCALANCE X310 | Lien |
SCALANCE X320-1-2LD FE | Lien |
SCALANCE X320-1 FE | Lien |
SCALANCE X320-1FE | Lien |
SCALANCE X320-3LDFE | Lien |
SCALANCE X408-2 | Lien |
SCALANCE X408 | Lien |
SCALANCE X414 | Lien |
SCALANCE XB-200 | Lien |
SCALANCE XB-200 | Lien |
SCALANCE XB-200 | Lien |
SCALANCE XC-200 | Lien |
SCALANCE XC-200 | Lien |
SCALANCE XC-200 | Lien |
SCALANCE XF-200BA | Lien |
SCALANCE XF-200BA | Lien |
SCALANCE XF-200BA | Lien |
SCALANCE XF201-3P IRT | Lien |
SCALANCE XF201-3P IRT | Lien |
SCALANCE XF202-2P IRT | Lien |
SCALANCE XF202-2P IRT | Lien |
SCALANCE XF204-2BA IRT | Lien |
SCALANCE XF204-2BA IRT | Lien |
SCALANCE XF204-2 (incl. SIPLUS NET variant) | Lien |
SCALANCE XF204-2 | Lien |
SCALANCE XF204 IRT | Lien |
SCALANCE XF204 IRT | Lien |
SCALANCE XF204 | Lien |
SCALANCE XF204 | Lien |
SCALANCE XF206-1 | Lien |
SCALANCE XF206-1 | Lien |
SCALANCE XF208 | Lien |
SCALANCE XF208 | Lien |
SCALANCE XM-400 Family | Lien |
SCALANCE XM400 | Lien |
SCALANCE XM-400 | Lien |
SCALANCE XM-400 | Lien |
SCALANCE XP-200 | Lien |
SCALANCE XP-200 | Lien |
SCALANCE XP-200 | Lien |
SCALANCE XR-300WG | Lien |
SCALANCE XR-300WG | Lien |
SCALANCE XR-300WG | Lien |
SCALANCE XR324-12M (230V ports on front) | Lien |
SCALANCE XR324-12M (230V ports on rear) | Lien |
SCALANCE XR324-12M (24V ports on front) | Lien |
SCALANCE XR324-12M (24V ports on rear) | Lien |
SCALANCE XR324-12M | Lien |
SCALANCE XR324-12M TS (24V) | Lien |
SCALANCE XR324-12M TS | Lien |
SCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on front) | Lien |
SCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on rear) | Lien |
SCALANCE XR324-4M EEC (24V ports on front) | Lien |
SCALANCE XR324-4M EEC (24V ports on rear) | Lien |
SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on front) | Lien |
SCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on rear) | Lien |
SCALANCE XR324-4M EEC | Lien |
SCALANCE XR324-4M PoE | Lien |
SCALANCE XR324-4M PoE TS | Lien |
SCALANCE XR-500 Family | Lien |
SCALANCE XR-500 Family | Lien |
SCALANCE XR500 | Lien |
SCALANCE XR-500 | Lien |
SENTRON 3VA COM100/800 | Lien |
SENTRON 3VA DSP800 | Lien |
SENTRON PAC2200 (with CLP Approval) | Lien |
SENTRON PAC2200 (with MID Approval) | Lien |
SENTRON PAC2200 (without MID Approval) | Lien |
SENTRON PAC3200 | Lien |
SENTRON PAC3200T | Lien |
SENTRON PAC3220 | Lien |
SENTRON PAC4200 | Lien |
SENTRON powermanager V4 | Lien |
SICAM 230 | Lien |
SICAM TOOLBOX II | Lien |
SIDOOR ATD430W | Lien |
SIDOOR ATE530S COATED | Lien |
SIDOOR ATE531S | Lien |
SIGUARD DSA | Lien |
SIMATIC CFU PA | Lien |
SIMATIC CFU PA | Lien |
SIMATIC Cloud Connect 7 CC712 | Lien |
SIMATIC Cloud Connect 7 CC716 | Lien |
SIMATIC CM 1542-1 | Lien |
SIMATIC CM 1542-1 | Lien |
SIMATIC CM 1542-1 | Lien |
SIMATIC CM 1542SP-1 | Lien |
SIMATIC Compact Field Unit | Lien |
SIMATIC CP 1242-7C | Lien |
SIMATIC CP 1242-7 GPRS V2 | Lien |
SIMATIC CP 1242-7 GPRS V2 | Lien |
SIMATIC CP 1242-7 GPRS V2 | Lien |
SIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants) | Lien |
SIMATIC CP 1243-1 IEC (incl. SIPLUS variants) | Lien |
SIMATIC CP 1243-1 (incl. SIPLUS variants) | Lien |
SIMATIC CP 1243-1 (incl. SIPLUS variants) | Lien |
SIMATIC CP 1243-1 IRC (incl. SIPLUS variants) | Lien |
SIMATIC CP 1243-1 | Lien |
SIMATIC CP 1243-1 | Lien |
SIMATIC CP 1243-1 | Lien |
SIMATIC CP 1243-7 LTE EU | Lien |
SIMATIC CP 1243-7 LTE EU | Lien |
SIMATIC CP 1243-7 LTE EU | Lien |
SIMATIC CP 1243-7 LTE EU | Lien |
SIMATIC CP 1243-7 LTE US | Lien |
SIMATIC CP 1243-7 LTE US | Lien |
SIMATIC CP 1243-7 LTE US | Lien |
SIMATIC CP 1243-7 LTE US | Lien |
SIMATIC CP 1243-8 IRC | Lien |
SIMATIC CP 1243-8 IRC | Lien |
SIMATIC CP 1243-8 IRC | Lien |
SIMATIC CP 1243-8 IRC | Lien |
SIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants) | Lien |
SIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants) | Lien |
SIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants) | Lien |
SIMATIC CP 1542SP-1 IRC | Lien |
SIMATIC CP 1542SP-1 | Lien |
SIMATIC CP 1542SP-1 | Lien |
SIMATIC CP 1542SP-1 | Lien |
SIMATIC CP 1543-1 (incl. SIPLUS variants) | Lien |
SIMATIC CP 1543-1 | Lien |
SIMATIC CP 1543-1 | Lien |
SIMATIC CP 1543-1 | Lien |
SIMATIC CP 1543-1 | Lien |
SIMATIC CP 1543SP-1 (incl. SIPLUS variants) | Lien |
SIMATIC CP 1543SP-1 (incl. SIPLUS variants) | Lien |
SIMATIC CP 1543SP-1 | Lien |
SIMATIC CP 1543SP-1 | Lien |
SIMATIC CP 1545-1 | Lien |
SIMATIC CP 1545-1 | Lien |
SIMATIC CP 1545-1 | Lien |
SIMATIC CP 1604 | Lien |
SIMATIC CP 1604 | Lien |
SIMATIC CP 1616 and CP 1604 | Lien |
SIMATIC CP1616/CP1604 | Lien |
SIMATIC CP 1616 | Lien |
SIMATIC CP 1616 | Lien |
SIMATIC CP 1623 | Lien |
SIMATIC CP 1623 | Lien |
SIMATIC CP1626 | Lien |
SIMATIC CP 1626 | Lien |
SIMATIC CP 1628 | Lien |
SIMATIC CP 1628 | Lien |
SIMATIC CP 343-1 Advanced (incl. SIPLUS variants) | Lien |
SIMATIC CP 343-1 Advanced (incl. SIPLUS variants) | Lien |
SIMATIC CP 343-1 Advanced | Lien |
SIMATIC CP 343-1 Advanced | Lien |
SIMATIC CP 343-1 Advanced | Lien |
SIMATIC CP 343-1 ERPC | Lien |
SIMATIC CP 343-1 (incl. SIPLUS variants) | Lien |
SIMATIC CP 343-1 Lean (incl. SIPLUS variants) | Lien |
SIMATIC CP 343-1 Lean | Lien |
SIMATIC CP 343-1 | Lien |
SIMATIC CP 442-1 RNA | Lien |
SIMATIC CP 442-1 RNA | Lien |
SIMATIC CP 443-1 Advanced (incl. SIPLUS variants) | Lien |
SIMATIC CP 443-1 Advanced (incl. SIPLUS variants) | Lien |
SIMATIC CP 443-1 Advanced (incl. SIPLUS variants) | Lien |
SIMATIC CP 443-1 Advanced | Lien |
SIMATIC CP 443-1 Advanced | Lien |
SIMATIC CP 443-1 Advanced | Lien |
SIMATIC CP 443-1 (incl. SIPLUS variants) | Lien |
SIMATIC CP 443-1 (incl. SIPLUS variants) | Lien |
SIMATIC CP 443-1 (incl. SIPLUS variants) | Lien |
SIMATIC CP 443-1 OPC UA | Lien |
SIMATIC CP 443-1 OPC UA | Lien |
SIMATIC CP 443-1 OPC UA | Lien |
SIMATIC CP 443-1 OPC UA | Lien |
SIMATIC CP 443-1 OPC UA | Lien |
SIMATIC CP 443-1 OPC UA | Lien |
SIMATIC CP 443-1 OPC UA | Lien |
SIMATIC CP 443-1 RNA | Lien |
SIMATIC CP 443-1 RNA | Lien |
SIMATIC CP 443-1 | Lien |
SIMATIC CP 443-1 | Lien |
SIMATIC CP 443-1 | Lien |
SIMATIC DK-16xx PN IO | Lien |
SIMATIC Drive Controller family | Lien |
SIMATIC Drive Controller family | Lien |
SIMATIC ET200AL IM 157-1 PN | Lien |
SIMATIC ET200AL | Lien |
SIMATIC ET200AL | Lien |
SIMATIC ET200AL | Lien |
SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
SIMATIC ET200ecoPN 16DI DC24V 8xM12 | Lien |
SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 16DO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
SIMATIC ET200ecoPN 4AO U/I 4xM12 | Lien |
SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
SIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12 | Lien |
SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
SIMATIC ET200ecoPN 8AI RTD/TC 8xM12 | Lien |
SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
SIMATIC ET200ecoPN 8DI DC24V 4xM12 | Lien |
SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
SIMATIC ET200ecoPN 8DI DC24V 8xM12 | Lien |
SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/05A 4xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/13A 4xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 8DO DC24V/13A 8xM12 | Lien |
SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
SIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12 | Lien |
SIMATIC ET200ecoPN: IO-Link Master | Lien |
SIMATIC ET200ecoPN: IO-Link Master | Lien |
SIMATIC ET200ecoPN: IO-Link Master | Lien |
SIMATIC ET200ecoPN: IO-Link Master | Lien |
SIMATIC ET200ecoPN: IO-Link Master | Lien |
SIMATIC ET200M IM153-4 PN IO HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200M IM153-4 PN IO ST (incl. SIPLUS variants) | Lien |
SIMATIC ET200M (incl. SIPLUS variants) | Lien |
SIMATIC ET200M (incl. SIPLUS variants) | Lien |
SIMATIC ET200M (incl. SIPLUS variants) | Lien |
SIMATIC ET200M (incl. SIPLUS variants) | Lien |
SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants) | Lien |
SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants) | Lien |
SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants) | Lien |
SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants) | Lien |
SIMATIC ET200pro IM 154-3 PN HF | Lien |
SIMATIC ET200pro IM 154-4 PN HF | Lien |
SIMATIC ET200pro | Lien |
SIMATIC ET200pro | Lien |
SIMATIC ET200pro | Lien |
SIMATIC ET200pro | Lien |
SIMATIC ET200S (incl. SIPLUS variants) | Lien |
SIMATIC ET200S (incl. SIPLUS variants) | Lien |
SIMATIC ET200S (incl. SIPLUS variants) | Lien |
SIMATIC ET200S (incl. SIPLUS variants) | Lien |
SIMATIC ET200S (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 MF HF | Lien |
SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN Basic (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants) | Lien |
SIMATIC ET200SP (incl. SIPLUS variants except IM155-6 PN ST and IM155-6 PN HF) | Lien |
SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) | Lien |
SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) | Lien |
SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) | Lien |
SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants) | Lien |
SIMATIC Field PG M5 | Lien |
SIMATIC Field PG M6 | Lien |
SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
SIMATIC HMI Comfort Outdoor Panels 7\ & 15\ (incl. SIPLUS variants) | Lien |
SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
SIMATIC HMI Comfort Panels 4\ - 22\ (incl. SIPLUS variants) | Lien |
SIMATIC HMI Comfort Panels HMI Multi Panels HMI Mobile Panels (incl. SIPLUS variants) | Lien |
SIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F | Lien |
SIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F | Lien |
SIMATIC HMI KTP Mobile Panels | Lien |
SIMATIC HMI KTP Mobile Panels | Lien |
SIMATIC IE/PB-LINK V3 | Lien |
SIMATIC Information Server | Lien |
SIMATIC IPC1047E | Lien |
SIMATIC IPC1047 | Lien |
SIMATIC IPC127E | Lien |
SIMATIC IPC427E | Lien |
SIMATIC IPC477E Pro | Lien |
SIMATIC IPC477E | Lien |
SIMATIC IPC527G | Lien |
SIMATIC IPC547G | Lien |
SIMATIC IPC627E | Lien |
SIMATIC IPC647D | Lien |
SIMATIC IPC647E | Lien |
SIMATIC IPC647E | Lien |
SIMATIC IPC677E | Lien |
SIMATIC IPC847D | Lien |
SIMATIC IPC847E | Lien |
SIMATIC IPC847E | Lien |
SIMATIC IPC DiagMonitor | Lien |
SIMATIC IPC DiagMonitor | Lien |
SIMATIC IPC Support Package for VxWorks | Lien |
SIMATIC ITC1500 PRO | Lien |
SIMATIC ITC1500 | Lien |
SIMATIC ITC1900 PRO | Lien |
SIMATIC ITC1900 | Lien |
SIMATIC ITC2200 PRO | Lien |
SIMATIC ITC2200 | Lien |
SIMATIC ITP1000 | Lien |
SIMATIC Logon | Lien |
SIMATIC MICRO-DRIVE PDC | Lien |
SIMATIC MV400 family | Lien |
SIMATIC MV400 | Lien |
SIMATIC MV540 H (6GF3540-0GE10) | Lien |
SIMATIC MV540 H | Lien |
SIMATIC MV540 H | Lien |
SIMATIC MV540 S (6GF3540-0CD10) | Lien |
SIMATIC MV540 S | Lien |
SIMATIC MV540 S | Lien |
SIMATIC MV550 H (6GF3550-0GE10) | Lien |
SIMATIC MV550 H | Lien |
SIMATIC MV550 H | Lien |
SIMATIC MV550 S (6GF3550-0CD10) | Lien |
SIMATIC MV550 S | Lien |
SIMATIC MV550 S | Lien |
SIMATIC MV560 U (6GF3560-0LE10) | Lien |
SIMATIC MV560 U | Lien |
SIMATIC MV560 U | Lien |
SIMATIC MV560 X (6GF3560-0HE10) | Lien |
SIMATIC MV560 X | Lien |
SIMATIC MV560 X | Lien |
SIMATIC NET CP 1604 | Lien |
SIMATIC NET CP 1616 | Lien |
SIMATIC NET DK-16xx PN IO | Lien |
SIMATIC NET PC Software | Lien |
SIMATIC PCS 7 TeleControl | Lien |
SIMATIC PCS 7 V8.2 and earlier | Lien |
SIMATIC PCS 7 V8.2 and earlier | Lien |
SIMATIC PCS 7 V9.0 | Lien |
SIMATIC PCS 7 V9.0 | Lien |
SIMATIC PCS 7 V9.1 | Lien |
SIMATIC PCS 7 V9.1 | Lien |
SIMATIC PCS neo | Lien |
SIMATIC PCS neo | Lien |
SIMATIC PCS neo | Lien |
SIMATIC PDM | Lien |
SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant) | Lien |
SIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant) | Lien |
SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
SIMATIC PN/PN Coupler (incl. SIPLUS NET variants) | Lien |
SIMATIC Power Line Booster PLB Base Module | Lien |
SIMATIC Process Historian (incl. Process Historian OPC UA Server) | Lien |
SIMATIC Process Historian OPC UA Server | Lien |
SIMATIC Process Historian OPC UA Server | Lien |
SIMATIC PROFINET Driver | Lien |
SIMATIC PROFINET Driver | Lien |
SIMATIC RF166C | Lien |
SIMATIC RF180C | Lien |
SIMATIC RF180C | Lien |
SIMATIC RF182C | Lien |
SIMATIC RF182C | Lien |
SIMATIC RF182C | Lien |
SIMATIC RF185C | Lien |
SIMATIC RF185C | Lien |
SIMATIC RF185C | Lien |
SIMATIC RF186CI | Lien |
SIMATIC RF186CI | Lien |
SIMATIC RF186C | Lien |
SIMATIC RF186C | Lien |
SIMATIC RF186C | Lien |
SIMATIC RF188CI | Lien |
SIMATIC RF188CI | Lien |
SIMATIC RF188C | Lien |
SIMATIC RF188C | Lien |
SIMATIC RF188C | Lien |
SIMATIC RF188C | Lien |
SIMATIC RF360R | Lien |
SIMATIC RF600 family | Lien |
SIMATIC RF600R | Lien |
SIMATIC RF600R | Lien |
SIMATIC RF600 | Lien |
SIMATIC RF650R | Lien |
SIMATIC RF680R | Lien |
SIMATIC RF685R | Lien |
SIMATIC RTU3010C | Lien |
SIMATIC RTU3030C | Lien |
SIMATIC RTU3031C | Lien |
SIMATIC RTU3041C | Lien |
SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-1200 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant) | Lien |
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant) | Lien |
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant) | Lien |
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP | Lien |
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP | Lien |
SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
SIMATIC S7-1500 Software Controller (incl. F) | Lien |
SIMATIC S7-1500 Software Controller | Lien |
SIMATIC S7-1500 Software Controller | Lien |
SIMATIC S7-1500 Software Controller | Lien |
SIMATIC S7-1500 Software Controller | Lien |
SIMATIC S7-1500 Software Controller | Lien |
SIMATIC S7-1500 Software Controller | Lien |
SIMATIC S7-200 SMART | Lien |
SIMATIC S7-200 SMART | Lien |
SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
SIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants) | Lien |
SIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 PN/DP V6 CPU family and below (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 PN/DP V6 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 PN/DP V7 and below CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-410 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-410 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants) | Lien |
SIMATIC S7-PLCSIM Advanced | Lien |
SIMATIC S7-PLCSIM Advanced | Lien |
SIMATIC TDC CP51M1 | Lien |
SIMATIC TDC CP51M1 | Lien |
SIMATIC TDC CP51M1 | Lien |
SIMATIC TDC CP51M1 | Lien |
SIMATIC TDC CPU555 | Lien |
SIMATIC TDC CPU555 | Lien |
SIMATIC TDC CPU555 | Lien |
SIMATIC TDC CPU555 | Lien |
SIMATIC Teleservice Adapter IE Advanced | Lien |
SIMATIC Teleservice Adapter IE Advanced | Lien |
SIMATIC Teleservice Adapter IE Advanced | Lien |
SIMATIC Teleservice Adapter IE Basic | Lien |
SIMATIC Teleservice Adapter IE Basic | Lien |
SIMATIC Teleservice Adapter IE Basic | Lien |
SIMATIC Teleservice Adapter IE Standard | Lien |
SIMATIC Teleservice Adapter IE Standard | Lien |
SIMATIC WinAC RTX (F) 2010 | Lien |
SIMATIC WinAC RTX (F) 2010 | Lien |
SIMATIC WinAC RTX (F) 2010 | Lien |
SIMATIC WinAC RTX (F) 2010 | Lien |
SIMATIC WinAC RTX (F) 2010 | Lien |
SIMATIC WinAC RTX (F) 2010 | Lien |
SIMATIC WinCC OA | Lien |
SIMATIC WinCC OA V3.17 | Lien |
SIMATIC WinCC OA V3.18 | Lien |
SIMATIC WinCC Runtime Advanced | Lien |
SIMATIC WinCC Runtime Advanced | Lien |
SIMATIC WinCC Runtime Advanced | Lien |
SIMATIC WinCC TeleControl | Lien |
SIMATIC WinCC V15 and earlier | Lien |
SIMATIC WinCC V15 and earlier | Lien |
SIMATIC WinCC V16 | Lien |
SIMATIC WinCC V16 | Lien |
SIMATIC WinCC V17 | Lien |
SIMATIC WinCC V17 | Lien |
SIMATIC WinCC V7.4 and earlier | Lien |
SIMATIC WinCC V7.4 and earlier | Lien |
SIMATIC WinCC V7.5 | Lien |
SIMATIC WinCC V7.5 | Lien |
Simcenter 3D | Lien |
Simcenter Amesim | Lien |
Simcenter Femap V2020.2 | Lien |
Simcenter Femap V2021.1 | Lien |
Simcenter System Architect | Lien |
Simcenter System Simulation Client for Git | Lien |
Simcenter Testlab Data Management | Lien |
Simcenter Testlab | Lien |
SIMIT Simulation Platform | Lien |
SIMOCODE pro V EIP (incl. SIPLUS variants) | Lien |
SIMOCODE proV Ethernet/IP | Lien |
SIMOCODE pro V PN (incl. SIPLUS variants) | Lien |
SIMOCODE pro V PN (incl. SIPLUS variants) | Lien |
SIMOCODE pro V PN (incl. SIPLUS variants) | Lien |
SIMOCODE proV PROFINET | Lien |
SIMOTION C | Lien |
SIMOTION C | Lien |
SIMOTION D (incl. SIPLUS variants) | Lien |
SIMOTION D (incl. SIPLUS variants) | Lien |
SIMOTION (incl. SIPLUS variants) | Lien |
SIMOTION (incl. SIPLUS variants) | Lien |
SIMOTION P | Lien |
SIMOTION P V4.4 and V4.5 | Lien |
SIMOTION P V5 | Lien |
SINAMICS Connect 300 | Lien |
SINAMICS DCM | Lien |
SINAMICS DCM | Lien |
SINAMICS DCM w. PN | Lien |
SINAMICS DCM w. PN | Lien |
SINAMICS DCP | Lien |
SINAMICS DCP | Lien |
SINAMICS DCP | Lien |
SINAMICS DCP w. PN | Lien |
SINAMICS DCP w. PN | Lien |
SINAMICS G110M V4.7 Control Unit | Lien |
SINAMICS G110M V4.7 PN Control Unit | Lien |
SINAMICS G110M w. PN | Lien |
SINAMICS G110M w. PN | Lien |
SINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants) | Lien |
SINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants) | Lien |
SINAMICS G120 V4.7 Control Unit (incl. SIPLUS variants) | Lien |
SINAMICS G120 V4.7 PN Control Unit (incl. SIPLUS variants) | Lien |
SINAMICS G130 V4.6 Control Unit | Lien |
SINAMICS G130 V4.7 Control Unit | Lien |
SINAMICS G130 V4.7 Control Unit | Lien |
SINAMICS G130 V4.7 Control Unit | Lien |
SINAMICS G130 V4.7 SP1 Control Unit | Lien |
SINAMICS G130 V4.7 w. PN | Lien |
SINAMICS G130 V4.7 w. PN | Lien |
SINAMICS G130 V4.8 Control Unit | Lien |
SINAMICS G130 V4.8 w. PN | Lien |
SINAMICS G130 V4.8 w. PN | Lien |
SINAMICS G130 V5.1 Control Unit | Lien |
SINAMICS G130 V5.1 SP1 Control Unit | Lien |
SINAMICS G150 Control Unit | Lien |
SINAMICS G150 Control Unit | Lien |
SINAMICS G150 V4.6 Control Unit | Lien |
SINAMICS G150 V4.7 Control Unit | Lien |
SINAMICS G150 V4.7 SP1 Control Unit | Lien |
SINAMICS G150 V4.7 w. PN | Lien |
SINAMICS G150 V4.7 w. PN | Lien |
SINAMICS G150 V4.8 Control Unit | Lien |
SINAMICS G150 V4.8 w. PN | Lien |
SINAMICS G150 V4.8 w. PN | Lien |
SINAMICS G150 V5.1 Control Unit | Lien |
SINAMICS G150 V5.1 SP1 Control Unit | Lien |
SINAMICS GH150 V4.7 Control Unit | Lien |
SINAMICS GH150 V4.7 Control Unit | Lien |
SINAMICS GL150 V4.7 Control Unit | Lien |
SINAMICS GL150 V4.7 Control Unit | Lien |
SINAMICS GM150 V4.7 Control Unit | Lien |
SINAMICS GM150 V4.7 Control Unit | Lien |
SINAMICS S110 Control Unit | Lien |
SINAMICS S110 Control Unit | Lien |
SINAMICS S110 w. PN | Lien |
SINAMICS S110 w. PN | Lien |
SINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants) | Lien |
SINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants) | Lien |
SINAMICS S120 V4.6 Control Unit (incl. SIPLUS variants) | Lien |
SINAMICS S120 V4.7 Control Unit and CBE20 (incl. SIPLUS variants) | Lien |
SINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants) | Lien |
SINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants) | Lien |
SINAMICS S120 V4.7 SP1 Control Unit (incl. SIPLUS variants) | Lien |
SINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants) | Lien |
SINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants) | Lien |
SINAMICS S120 V4.7 w. PN (incl. SIPLUS variants) | Lien |
SINAMICS S120 V4.7 w. PN (incl. SIPLUS variants) | Lien |
SINAMICS S120 V4.8 Control Unit (incl. SIPLUS variants) | Lien |
SINAMICS S120 V4.8 w. PN (incl. SIPLUS variants) | Lien |
SINAMICS S120 V4.8 w. PN (incl. SIPLUS variants) | Lien |
SINAMICS S120 V5.1 Control Unit (incl. SIPLUS variants) | Lien |
SINAMICS S120 V5.1 SP1 Control Unit (incl. SIPLUS variants) | Lien |
SINAMICS S150 Control Unit | Lien |
SINAMICS S150 Control Unit | Lien |
SINAMICS S150 V4.6 Control Unit | Lien |
SINAMICS S150 V4.7 Control Unit | Lien |
SINAMICS S150 V4.7 SP1 Control Unit | Lien |
SINAMICS S150 V4.7 w. PN | Lien |
SINAMICS S150 V4.7 w. PN | Lien |
SINAMICS S150 V4.8 Control Unit | Lien |
SINAMICS S150 V4.8 w. PN | Lien |
SINAMICS S150 V4.8 w. PN | Lien |
SINAMICS S150 V5.1 Control Unit | Lien |
SINAMICS S150 V5.1 SP1 Control Unit | Lien |
SINAMICS S210 V5.1 Control Unit | Lien |
SINAMICS S210 V5.1 SP1 Control Unit | Lien |
SINAMICS S/G Control Unit w. PROFINET | Lien |
SINAMICS SL150 V4.7 Control Unit | Lien |
SINAMICS SL150 V4.7 Control Unit | Lien |
SINAMICS SM120 V4.7 Control Unit | Lien |
SINAMICS SM120 V4.7 Control Unit | Lien |
SINAMICS V90 w. PN | Lien |
SINAMICS V90 w. PN | Lien |
SINEC INS | Lien |
SINEC NMS | Lien |
SINEC-NMS | Lien |
SINEC NMS | Lien |
SINEMA Remote Connect Server | Lien |
SINEMA Remote Connect Server | Lien |
SINEMA Remote Connect Server | Lien |
SINEMA Remote Connect Server | Lien |
SINEMA Remote Connect Server | Lien |
SINEMA Server | Lien |
SINEMA Server | Lien |
SINEMA Server V14 | Lien |
SINUMERIK 808D | Lien |
SINUMERIK 828D HW PU.4 | Lien |
SINUMERIK 828D | Lien |
SINUMERIK 828D | Lien |
SINUMERIK 828D | Lien |
SINUMERIK 828D V4.5 and prior | Lien |
SINUMERIK 828D V4.7 | Lien |
SINUMERIK 840D sl | Lien |
SINUMERIK 840D sl | Lien |
SINUMERIK 840D sl | Lien |
SINUMERIK 840D sl | Lien |
SINUMERIK 840D sl V4.5 and prior | Lien |
SINUMERIK 840D sl V4.7 | Lien |
SINUMERIK MC MCU 1720 | Lien |
SINUMERIK ONE NCU 1740 | Lien |
SINUMERIK ONE PPU 1740 | Lien |
SINUMERIK ONE / SINUMERIK 840D sl Handheld Terminal HT 10 | Lien |
SINUMERIK OPC UA Server | Lien |
SINUMERIK OPC UA Server | Lien |
SINUMERIK Operate | Lien |
SiPass integrated V2.80 | Lien |
SiPass integrated V2.85 | Lien |
SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL | Lien |
SIPLUS ET 200SP CP 1543SP-1 ISEC | Lien |
SIPLUS ET 200SP CP 1543SP-1 ISEC | Lien |
SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL | Lien |
SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL | Lien |
SIPLUS NET CP 1543-1 | Lien |
SIPLUS NET CP 1543-1 | Lien |
SIPLUS NET CP 1543-1 | Lien |
SIPLUS NET CP 1543-1 | Lien |
SIPLUS NET CP 343-1 Advanced | Lien |
SIPLUS NET CP 343-1 Advanced | Lien |
SIPLUS NET CP 343-1 Advanced | Lien |
SIPLUS NET CP 343-1 Lean | Lien |
SIPLUS NET CP 343-1 | Lien |
SIPLUS NET CP 443-1 Advanced | Lien |
SIPLUS NET CP 443-1 Advanced | Lien |
SIPLUS NET CP 443-1 Advanced | Lien |
SIPLUS NET CP 443-1 | Lien |
SIPLUS NET CP 443-1 | Lien |
SIPLUS NET CP 443-1 | Lien |
SIPLUS S7-1200 CP 1243-1 RAIL | Lien |
SIPLUS S7-1200 CP 1243-1 RAIL | Lien |
SIPLUS S7-1200 CP 1243-1 RAIL | Lien |
SIPLUS S7-1200 CP 1243-1 | Lien |
SIPLUS S7-1200 CP 1243-1 | Lien |
SIPLUS S7-1200 CP 1243-1 | Lien |
SIPLUS TIM 1531 IRC | Lien |
SIPLUS TIM 1531 IRC | Lien |
SIRIUS ACT 3SU1 interface module PROFINET | Lien |
SIRIUS Motor Starter M200D PROFINET | Lien |
SIRIUS Soft Starter 3RW44 PN | Lien |
SIRIUS Soft Starter 3RW44 PN | Lien |
SITOP Manager | Lien |
SITOP PSU8600 PROFINET | Lien |
SITOP PSU8600 | Lien |
SITOP UPS1600 (incl. SIPLUS variants) | Lien |
SITOP UPS1600 PROFINET (incl. SIPLUS variants) | Lien |
Siveillance Command | Lien |
Siveillance Control Pro | Lien |
Siveillance Identity V1.5 | Lien |
Siveillance Identity V1.6 | Lien |
Siveillance Vantage | Lien |
SOFTNET-IE PNIO | Lien |
SOFTNET-IE PNIO | Lien |
Softnet PROFINET IO for PC-based Windows systems | Lien |
Solid Edge CAM Pro | Lien |
Solid Edge Harness Design | Lien |
Solid Edge SE2021 | Lien |
Solid Edge SE2022 | Lien |
Spectrum Power 4 | Lien |
Spectrum Power 4 | Lien |
Spectrum Power 7 | Lien |
SPPA-T3000 SeS3000 Security Server (6DU7054-0..00-..A0) | Lien |
Teamcenter Active Workspace | Lien |
Teamcenter Briefcase Browser | Lien |
Teamcenter Data Share Manager | Lien |
Teamcenter Deployment Center | Lien |
Teamcenter Dispatcher Service | Lien |
Teamcenter EDA | Lien |
Teamcenter FMS | Lien |
Teamcenter Integration for CATIA | Lien |
Teamcenter Integration Framework | Lien |
Teamcenter MBSE Gateway | Lien |
Teamcenter Mendix Connector | Lien |
Teamcenter Microservices Framework | Lien |
Teamcenter Polarion Integration | Lien |
Teamcenter Rapid Start | Lien |
Teamcenter Reporting and Analytics V11 | Lien |
Teamcenter Reporting and Analytics V12.2 | Lien |
Teamcenter Reporting and Analytics V12.3 | Lien |
Teamcenter Reporting and Analytics V12.4 | Lien |
Teamcenter Reporting and Analytics V13 | Lien |
Teamcenter Retail Footwear and Apparel | Lien |
Teamcenter Security Services | Lien |
Teamcenter Supplier Collaboration | Lien |
Teamcenter System Modeling Workbench | Lien |
Teamcenter | Lien |
Teamcenter Technical Publishing | Lien |
Teamcenter Visualization V12.4 | Lien |
Teamcenter Visualization V13.1 | Lien |
Teamcenter Visualization V13.2 | Lien |
Teamcenter Visualization V13.3 | Lien |
Tecnomatix eBOP Manager Server | Lien |
Tecnomatix Intosite | Lien |
Tecnomatix Plant Simulation | Lien |
Tecnomatix Process Designer | Lien |
Tecnomatix Process Simulate | Lien |
Tecnomatix Process Simulate VCLite | Lien |
Tecnomatix RobotExpert | Lien |
TeleControl Server Basic | Lien |
TIA Administrator | Lien |
TIA Administrator | Lien |
TIM 1531 IRC (incl. SIPLUS NET variants) | Lien |
TIM 1531 IRC (incl. SIPLUS NET variants) | Lien |
TIM 1531 IRC (incl. SIPLUS NET variants) | Lien |
TIM 1531 IRC | Lien |
TIM 1531 IRC | Lien |
TIM 3V-IE Advanced (incl. SIPLUS NET variants) | Lien |
TIM 3V-IE DNP3 (incl. SIPLUS NET variants) | Lien |
TIM 3V-IE (incl. SIPLUS NET variants) | Lien |
TIM 4R-IE DNP3 (incl. SIPLUS NET variants) | Lien |
TIM 4R-IE (incl. SIPLUS NET variants) | Lien |
Valor Parts Library - VPL Direct | Lien |
Valor Parts Library - VPL Server or Service | Lien |
VeSys | Lien |
Xpedition Enterprise VX.2.10 | Lien |
Xpedition Enterprise VX.2.6 | Lien |
Xpedition Enterprise VX.2.7 | Lien |
Xpedition Enterprise VX.2.8 | Lien |
Xpedition Enterprise (XCR) VX.2.10 | Lien |
Xpedition IC Packaging VX.2.10 | Lien |
Xpedition IC Packaging VX.2.6 | Lien |
Xpedition IC Packaging VX.2.7 | Lien |
Xpedition IC Packaging VX.2.8 | Lien |
Xpedition IC Packaging (XCR) VX.2.10 | Lien |
Vendor | Product | Description |
---|
Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [], "affected_systems_content": "\u003ctable\u003e \u003cthead\u003e \u003ctr\u003e \u003cth\u003eSyst\u00e8me affect\u00e9\u003c/th\u003e \u003cth\u003eLien vers l\u0027avis \u00e9diteur\u003c/th\u003e \u003c/tr\u003e \u003c/thead\u003e \u003ctbody\u003e \u003ctr\u003e \u003ctd\u003eAdvantage Navigator Energy \u0026amp; Sustainability\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eAdvantage Navigator Software Proxy V6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eBuilding Operator Discovery Distribution for the Connect X200 Gateway\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eBuilding Operator Discovery Distribution for the Connect X300 Gateway\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eBuilding Twin - 360\u00b0 Viewer\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCapital\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCerberus DMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCloudConnect 712\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS V10.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-995338.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS V10.3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-995338.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eCOMOS V10.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-995338.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ecRSP Operator Client Starter\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ecRSP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDesigo CC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eDevelopment/Evaluation Kits for PROFINET IO: EK-ERTEC 200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eE-Car OC Cloud Application\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergy Engage\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergyIP Prepay V3.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergyIP Prepay V3.8\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnergyIP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnlighted Amaze\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eEnlighted Where\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eGeolus Shape Search V10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eGeolus Shape Search V11\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eGMA-Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eHEEDS Connect\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eHES UDIS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIE/AS-i Link PN IO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIE/PB-Link (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIE/PB LINK PN IO (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIndustrial Edge Hub\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIndustrial Edge Management App (IEM-App)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eIndustrial Edge Management OS (IEM-OS)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ejROS for Spectrum Power 4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ejROS for Spectrum Power 7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eJT2Go\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eKTK ATE530S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eLOGO! CMR2020\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eLOGO! CMR2040\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMendix Applications\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere App Management Cockpits (Developer\u0026amp; Operator)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Asset Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindsphere Cloud Foundry\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindsphere Cloud Platform\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere IAM (User Management/ Settings)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Integrated Data Lake\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Notification Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Predictive Learning\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Usage Transparency Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eMindSphere Visual Explorer\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eNXpower Monitor\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eNX\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOpcenter EX CP Process Automation Control\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOpcenter Execution Core Process Automation Control\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOpcenter Intelligence\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eOperation Scheduler\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ePROFINET Driver for Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003ePSS(R)CAPE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRFID 181EIP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eROX II\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM APE1404 Linux\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM CROSSBOW Station Access Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RCM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) NAM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224 LTE(4G) NAM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RM1224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX MX5000RE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX MX5000\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1501\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1510\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1511\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1512\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1524\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX1536\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM ROX RX5000\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RX1400 VPE Debian Linux\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eRUGGEDCOM RX1400 VPE Linux CloudConnect\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE LPE9403\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M-800 / S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M-800\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M804PB\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M812-1 ADSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex A)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router (Annex B)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M816-1 ADSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M826-2 SHDSL-Router\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M874-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M875\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3 (ROK)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE M876-4 (NAM)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (EU)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (RoW)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE MUM856-1 (RoW)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S602\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S602\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S602\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S612\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S612\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S612\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S615\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S627-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S627-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE S627-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC622-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC632-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC636-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC642-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE SC646-2C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-1700 IEEE 802.11ac family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-1700 IEEE 802.11ac family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-1700 IEEE 802.11ac family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1750D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1750D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 EEC M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 EEC M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2IA M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2IA M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W1788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W-700 IEEE 802.11n family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W700\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W721-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W721-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W722-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W722-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W734-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W738-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W738-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W748-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W761-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W761-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W774-1 RJ45 (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12 EEC (USA)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W778-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2IA RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2IA RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 SFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W786-2 SFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-1 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 M12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE W788-2 RJ45\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM763-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1 EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WAM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WLC711\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WLC712\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM763-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1 6GHz\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE WUM766-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-913875.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X200-4 P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X200-4 P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200IRT switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-200 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X202-2P IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2FM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2FM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2LD TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204-2TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP/HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP/HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA EEC (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (HSR)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-100232.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X204RNA (PRP)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1LD (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X208\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X212-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X216\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X216\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X224\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X-300 switch family (incl. X408 and SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-443566.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7 EEC (2x 24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X302-7EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X304-2FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X304-2FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X306-1LD FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X306-1LDFE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 230V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 230V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 24V coated)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2 EEC (2x 24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-2EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X307-3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LD\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH+\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH+\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2LH\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M PoE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M PoE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2M TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X308-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X310\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-1-2LD FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-1 FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-1FE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X320-3LDFE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X408-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X408\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE X414\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XB-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XB-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XB-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XC-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XC-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XC-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF-200BA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF-200BA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF-200BA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF201-3P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF202-2P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF202-2P IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2BA IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2BA IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204-2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204 IRT\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF204\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF206-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF208\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XF208\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM-400 Family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM-400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XM-400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XP-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XP-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XP-200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-300WG\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-300WG\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-300WG\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (230V ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (230V ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (24V ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M (24V ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M TS (24V)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-12M TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (100-240VAC/60-250VDC ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (24V ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (24V ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on front)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC (2x 100-240VAC/60-250VDC ports on rear)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M EEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M PoE\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR324-4M PoE TS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-500 Family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-500 Family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSCALANCE XR-500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON 3VA COM100/800\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON 3VA DSP800\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC2200 (with CLP Approval)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC2200 (with MID Approval)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC2200 (without MID Approval)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC3200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC3200T\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC3220\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON PAC4200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-541018.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSENTRON powermanager V4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSICAM 230\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSICAM TOOLBOX II\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-669737.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIDOOR ATD430W\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIDOOR ATE530S COATED\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIDOOR ATE531S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIGUARD DSA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CFU PA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CFU PA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Cloud Connect 7 CC712\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Cloud Connect 7 CC716\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CM 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Compact Field Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7 GPRS V2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7 GPRS V2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1242-7 GPRS V2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 DNP3 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 IEC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE EU\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-7 LTE US\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1243-8 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1542SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1543SP-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1545-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1545-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1545-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1616 and CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP1616/CP1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1616\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1616\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1623\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP1626\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1626\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1628\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 1628\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 ERPC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Lean (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1 Lean\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 343-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 442-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 442-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-211752.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 OPC UA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1 RNA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC DK-16xx PN IO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Drive Controller family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Drive Controller family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL IM 157-1 PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200AL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 16DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 4AO U/I 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI; 4 U/I; 4 RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8AI RTD/TC 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DI DC24V 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DIO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/05A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 4xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8DO DC24V/13A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN 8 DO DC24V/2A 8xM12\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200ecoPN: IO-Link Master\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M IM153-4 PN IO HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M IM153-4 PN IO ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200M (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro IM 154-3 PN HF\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro IM 154-4 PN HF\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200S (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 MF HF\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN Basic (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET200SP (incl. SIPLUS variants except IM155-6 PN ST and IM155-6 PN HF)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Field PG M5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Field PG M6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Outdoor Panels 7\\ \u0026amp; 15\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels 4\\ - 22\\ (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI Comfort Panels HMI Multi Panels HMI Mobile Panels (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels KTP400F KTP700 KTP700F KTP900 and KTP900F\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC HMI KTP Mobile Panels\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IE/PB-LINK V3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Information Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC1047E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC1047\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC127E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC427E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC477E Pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC477E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC527G\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC547G\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC627E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC647D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC647E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC647E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC677E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC847D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC847E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC847E\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC DiagMonitor\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC DiagMonitor\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC IPC Support Package for VxWorks\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1500 PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1500\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1900 PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC1900\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC2200 PRO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITC2200\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC ITP1000\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Logon\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MICRO-DRIVE PDC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV400 family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV400\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 H (6GF3540-0GE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 S (6GF3540-0CD10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV540 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 H (6GF3550-0GE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 H\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 S (6GF3550-0CD10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV550 S\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 U (6GF3560-0LE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 U\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 U\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 X (6GF3560-0HE10)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 X\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC MV560 X\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET CP 1604\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET CP 1616\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET DK-16xx PN IO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC NET PC Software\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 TeleControl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V8.2 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V8.2 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.0\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.0\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS 7 V9.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS neo\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS neo\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PCS neo\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PDM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler 6ES7158-3AD01-0XA0 (incl. SIPLUS NET variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PN/PN Coupler (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Power Line Booster PLB Base Module\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Process Historian (incl. Process Historian OPC UA Server)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Process Historian OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Process Historian OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PROFINET Driver\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC PROFINET Driver\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF166C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF180C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF180C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF182C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-102233.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF182C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF182C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF185C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF185C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF185C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF186C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188CI\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF188C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF360R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600 family\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF600\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF650R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF680R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RF685R\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3010C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3030C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3031C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC RTU3041C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-316383.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1200 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518-4 PN/DP MFP (MLFB: 6ES7518-4AX00-1AC0 6AG1518-4AX00-4AC0 incl. SIPLUS variant)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518F-4 PN/DP MFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU 1518F-4 PN/DP MFP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller (incl. F)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-1500 Software Controller\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-200 SMART\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-200 SMART\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-300 CPU family (incl. related ET200 CPUs and SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family and below (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 CPU family and below (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V6 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 and below CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-400 PN/DP V7 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-410 V8 CPU family (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-PLCSIM Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC S7-PLCSIM Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CP51M1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC TDC CPU555\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Standard\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC Teleservice Adapter IE Standard\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinAC RTX (F) 2010\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC OA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC OA V3.17\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC OA V3.18\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC Runtime Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC Runtime Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC Runtime Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC TeleControl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V15 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V15 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V16\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V16\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V17\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V17\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.4 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.4 and earlier\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-840188.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMATIC WinCC V7.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-914168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter 3D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Amesim\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Femap V2020.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-609880.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Femap V2021.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-609880.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter System Architect\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter System Simulation Client for Git\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Testlab Data Management\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSimcenter Testlab\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMIT Simulation Platform\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V EIP (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE proV Ethernet/IP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE pro V PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOCODE proV PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION C\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION D (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION D (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION P\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION P V4.4 and V4.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIMOTION P V5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS Connect 300\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCM w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS DCP w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M V4.7 PN Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G110M w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120(C/P/D) w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120 V4.7 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G120 V4.7 PN Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.6 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.8 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G130 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.6 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.8 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS G150 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GH150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GH150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GM150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS GM150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S110 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 prior to V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.6 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 Control Unit and CBE20 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 SP1 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 SP1 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.7 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.8 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.8 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V4.8 w. PN (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V5.1 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S120 V5.1 SP1 Control Unit (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.6 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.7 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.8 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V4.8 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S150 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S210 V5.1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S210 V5.1 SP1 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS S/G Control Unit w. PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-593272.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SL150 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SM120 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS SM120 V4.7 Control Unit\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS V90 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINAMICS V90 w. PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC INS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC NMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC-NMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEC NMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-654775.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Remote Connect Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-675303.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINEMA Server V14\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 808D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D HW PU.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D V4.5 and prior\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 828D V4.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-349422.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-473245.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl V4.5 and prior\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK 840D sl V4.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK MC MCU 1720\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK ONE NCU 1740\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK ONE PPU 1740\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK ONE / SINUMERIK 840D sl Handheld Terminal HT 10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-309571.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK OPC UA Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSINUMERIK Operate\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiPass integrated V2.80\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiPass integrated V2.85\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 1543-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1 Lean\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 343-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1 Advanced\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS NET CP 443-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1 RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1 RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1 RAIL\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS S7-1200 CP 1243-1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-539476.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS TIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIPLUS TIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS ACT 3SU1 interface module PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS Motor Starter M200D PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS Soft Starter 3RW44 PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSIRIUS Soft Starter 3RW44 PN\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-346262.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP PSU8600 PROFINET\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP PSU8600\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP UPS1600 (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSITOP UPS1600 PROFINET (incl. SIPLUS variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Command\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Control Pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Identity V1.5\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Identity V1.6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSiveillance Vantage\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSOFTNET-IE PNIO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-599968.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSOFTNET-IE PNIO\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-780073.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSoftnet PROFINET IO for PC-based Windows systems\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-293562.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge CAM Pro\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge Harness Design\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge SE2021\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSolid Edge SE2022\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSpectrum Power 4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSpectrum Power 4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-831168.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSpectrum Power 7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eSPPA-T3000 SeS3000 Security Server (6DU7054-0..00-..A0)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-714170.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Active Workspace\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Briefcase Browser\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Data Share Manager\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Deployment Center\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Dispatcher Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter EDA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter FMS\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Integration for CATIA\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Integration Framework\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter MBSE Gateway\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Mendix Connector\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Microservices Framework\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Polarion Integration\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Rapid Start\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V11\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V12.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V12.3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V12.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Reporting and Analytics V13\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Retail Footwear and Apparel\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Security Services\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Supplier Collaboration\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter System Modeling Workbench\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Technical Publishing\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V12.4\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V13.1\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V13.2\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeamcenter Visualization V13.3\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-301589.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix eBOP Manager Server\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Intosite\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Plant Simulation\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Process Designer\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Process Simulate\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix Process Simulate VCLite\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTecnomatix RobotExpert\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTeleControl Server Basic\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-307392.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIA Administrator\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-244969.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIA Administrator\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-480230.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-838121.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-978220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 1531 IRC\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-772220.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 3V-IE Advanced (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 3V-IE DNP3 (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 3V-IE (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 4R-IE DNP3 (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eTIM 4R-IE (incl. SIPLUS NET variants)\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-462066.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eValor Parts Library - VPL Direct\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eValor Parts Library - VPL Server or Service\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eVeSys\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise VX.2.8\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition Enterprise (XCR) VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.6\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.7\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging VX.2.8\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003ctr\u003e \u003ctd\u003eXpedition IC Packaging (XCR) VX.2.10\u003c/td\u003e \u003ctd\u003e\u003ca href=\"https://cert-portal.siemens.com/productcert/html/ssa-661247.html\"\u003eLien\u003c/a\u003e\u003c/td\u003e \u003c/tr\u003e \u003c/tbody\u003e \u003c/table\u003e ", "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-40360", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40360" }, { "name": "CVE-2016-1547", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1547" }, { "name": "CVE-2021-37186", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37186" }, { "name": "CVE-2020-26139", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26139" }, { "name": "CVE-2016-4956", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4956" }, { "name": "CVE-2021-37198", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37198" }, { "name": "CVE-2016-4953", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4953" }, { "name": "CVE-2021-40363", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40363" }, { "name": "CVE-2021-46151", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46151" }, { "name": "CVE-2021-44018", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44018" }, { "name": "CVE-2022-23312", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23312" }, { "name": "CVE-2021-41990", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41990" }, { "name": "CVE-2015-5621", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5621" }, { "name": "CVE-2021-46161", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46161" }, { "name": "CVE-2021-41991", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41991" }, { "name": "CVE-2021-46160", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46160" }, { "name": "CVE-2022-23102", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23102" }, { "name": "CVE-2019-11478", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11478" }, { "name": "CVE-2019-13933", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13933" }, { "name": "CVE-2019-8460", "url": "https://www.cve.org/CVERecord?id=CVE-2019-8460" }, { "name": "CVE-2019-6575", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6575" }, { "name": "CVE-2020-26146", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26146" }, { "name": "CVE-2020-26143", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26143" }, { "name": "CVE-2019-6568", "url": "https://www.cve.org/CVERecord?id=CVE-2019-6568" }, { "name": "CVE-2016-1550", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1550" }, { "name": "CVE-2015-7705", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7705" }, { "name": "CVE-2021-46156", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46156" }, { "name": "CVE-2021-37197", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37197" }, { "name": "CVE-2016-7433", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7433" }, { "name": "CVE-2021-37194", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37194" }, { "name": "CVE-2021-46153", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46153" }, { "name": "CVE-2016-4955", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4955" }, { "name": "CVE-2015-7853", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7853" }, { "name": "CVE-2021-46152", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46152" }, { "name": "CVE-2017-2680", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2680" }, { "name": "CVE-2015-8138", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8138" }, { "name": "CVE-2020-12360", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12360" }, { "name": "CVE-2016-4954", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4954" }, { "name": "CVE-2020-24588", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24588" }, { "name": "CVE-2021-37185", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37185" }, { "name": "CVE-2021-46154", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46154" }, { "name": "CVE-2020-26140", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26140" }, { "name": "CVE-2021-37195", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37195" }, { "name": "CVE-2020-8703", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8703" }, { "name": "CVE-2019-10936", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10936" }, { "name": "CVE-2020-12357", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12357" }, { "name": "CVE-2021-46159", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46159" }, { "name": "CVE-2021-3449", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3449" }, { "name": "CVE-2017-12741", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12741" }, { "name": "CVE-2021-40358", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40358" }, { "name": "CVE-2019-10923", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10923" }, { "name": "CVE-2021-43336", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43336" }, { "name": "CVE-2020-26144", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26144" }, { "name": "CVE-2021-44000", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44000" }, { "name": "CVE-2021-20094", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20094" }, { "name": "CVE-2020-24513", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24513" }, { "name": "CVE-2019-11479", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11479" }, { "name": "CVE-2021-20093", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20093" }, { "name": "CVE-2021-38405", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38405" }, { "name": "CVE-2020-24507", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24507" }, { "name": "CVE-2021-46155", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46155" }, { "name": "CVE-2020-13987", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13987" }, { "name": "CVE-2021-45046", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45046" }, { "name": "CVE-2020-12358", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12358" }, { "name": "CVE-2021-37196", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37196" }, { "name": "CVE-2021-40364", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40364" }, { "name": "CVE-2019-11477", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11477" }, { "name": "CVE-2020-26147", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26147" }, { "name": "CVE-2021-37204", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37204" }, { "name": "CVE-2019-19300", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19300" }, { "name": "CVE-2019-13946", "url": "https://www.cve.org/CVERecord?id=CVE-2019-13946" }, { "name": "CVE-2019-10942", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10942" }, { "name": "CVE-2020-8670", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8670" }, { "name": "CVE-2017-2681", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2681" }, { "name": "CVE-2016-2518", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2518" }, { "name": "CVE-2020-8704", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8704" }, { "name": "CVE-2020-28400", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28400" }, { "name": "CVE-2021-46158", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46158" }, { "name": "CVE-2021-44228", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44228" }, { "name": "CVE-2016-7431", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7431" }, { "name": "CVE-2021-3712", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3712" }, { "name": "CVE-2020-26141", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26141" }, { "name": "CVE-2020-24486", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24486" }, { "name": "CVE-2020-24506", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24506" }, { "name": "CVE-2021-46157", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46157" }, { "name": "CVE-2021-45106", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45106" }, { "name": "CVE-2020-24512", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24512" }, { "name": "CVE-2020-17437", "url": "https://www.cve.org/CVERecord?id=CVE-2020-17437" }, { "name": "CVE-2021-44016", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44016" }, { "name": "CVE-2020-24511", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24511" }, { "name": "CVE-2021-40359", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40359" }, { "name": "CVE-2021-37205", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37205" }, { "name": "CVE-2018-18065", "url": "https://www.cve.org/CVERecord?id=CVE-2018-18065" }, { "name": "CVE-2017-6458", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6458" }, { "name": "CVE-2016-1548", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1548" }, { "name": "CVE-2019-19301", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19301" }, { "name": "CVE-2016-9042", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9042" }, { "name": "CVE-2020-26145", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26145" } ], "initial_release_date": "2022-02-09T00:00:00", "last_revision_date": "2022-02-09T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-124", "revisions": [ { "description": "Version initiale", "revision_date": "2022-02-09T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-541018 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-541018.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-914168 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-914168.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-309571 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-309571.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-675303 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-675303.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-244969 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-244969.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-654775 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-654775.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-316383 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-316383.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-100232 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-100232.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-480230 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-480230.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-978220 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-978220.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-840188 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-840188.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-211752 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-211752.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-772220 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-772220.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-539476 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-539476.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-599968 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-599968.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-443566 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-443566.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-995338 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-995338.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-462066 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-462066.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-102233 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-102233.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-301589 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-301589.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-669737 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-669737.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-609880 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-609880.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssb-439005 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssb-439005.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-473245 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-473245.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-831168 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-831168.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-593272 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-593272.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-838121 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-838121.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-307392 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-307392.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-780073 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-780073.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-349422 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-349422.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-346262 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-346262.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-293562 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-293562.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-913875 du 08 f\u00e9vrier 2022", "url": "https://cert-portal.siemens.com/productcert/html/ssa-913875.html" } ] }
CERTFR-2016-AVI-045
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans les produits Cisco. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à l'intégrité des données et une injection de code indirecte à distance (XSS).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Cisco | N/A | Cisco Digital Media Manager (DMM) | ||
Cisco | N/A | Cisco NAC Guest Server versions antérieures à 2.1.0 (disponible le 19 février 2016) | ||
Cisco | IOS | IOS-XR for Cisco Network Convergence System (NCS) 6000 | ||
Cisco | N/A | Cisco Intelligent Automation for Cloud | ||
Cisco | N/A | Cisco DCM Series 9900-Digital Content Manager versions antérieures à 18.0 (disponible le 31 mars 2016) | ||
Cisco | N/A | Cisco Video Surveillance Media Server | ||
Cisco | N/A | Cisco FireSIGHT System Software versions antérieures à 6.1 (disponible en juin 2016) | ||
Cisco | Unified Communications Manager Session Management Edition | Cisco Unified Communications Manager Session Management Edition (SME) | ||
Cisco | N/A | Cisco Videoscape Policy and Resource Management | ||
Cisco | N/A | Cisco Management Heartbeat Server versions antérieures à RMS5.x MR (disponible le 29 juillet 2016) | ||
Cisco | N/A | Cisco Standalone rack server CIMC | ||
Cisco | N/A | Cloud Object Store (COS) versions antérieures à 3.8 (disponible le 9 avril 2016) | ||
Cisco | N/A | Cisco Universal Small Cell 7000 Series exécutant la version V3.4.2.x | ||
Cisco | N/A | Cisco Finesse | ||
Cisco | N/A | Cisco Hosted Collaboration Mediation Fulfillment | ||
Cisco | N/A | Cisco TelePresence Video Communication Server (VCS) versions antérieures à 8.7.1 (disponible le 22 février 2016) | ||
Cisco | N/A | Cisco UCS Central | ||
Cisco | N/A | Cisco TelePresence Conductor versions antérieures à XC4.2 (disponible le 30 mars 2016) | ||
Cisco | N/A | Cisco Application and Content Networking System (ACNS) versions antérieures à 5.5.41 (disponible le 29 février 2016) | ||
Cisco | N/A | Cisco Digital Media Manager | ||
Cisco | N/A | Cisco Virtual Topology System | ||
Cisco | N/A | Cisco IP Interoperability and Collaboration System (IPICS) | ||
Cisco | Unified Communications | Unified Communications Deployment Tools | ||
Cisco | N/A | Cisco Enterprise Content Delivery System (ECDS) versions antérieures à 2.6.7 (disponible le 30 avril 2016) | ||
Cisco | N/A | Cisco Quantum Virtualized Packet Core | ||
Cisco | N/A | Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) version 1.1 | ||
Cisco | N/A | Cisco ASA CX et Cisco Prime Security Manager versions antérieures à 9.3.4.5 (disponible le 30 mai 2016) | ||
Cisco | Jabber | Cisco Jabber Guest 10.0(2) | ||
Cisco | N/A | Cisco Intrusion Prevention System Solutions (IPS) versions antérieures à 7.1(11) Patch 1 (disponible le 31 mars 2016) | ||
Cisco | N/A | Cisco 910 Industrial Router | ||
Cisco | Expressway Series | Cisco Expressway Series versions antérieures à 8.7.1 (disponible le 22 février 2016) | ||
Cisco | N/A | Cisco TelePresence MX Series | ||
Cisco | N/A | Cisco TelePresence SX Series | ||
Cisco | N/A | Cisco Clean Access Manager versions antérieures à 4.9.5 (disponible le 19 février 2016) | ||
Cisco | N/A | Cisco Video Delivery System Recorder (correctif disponible le 30 avril 2016) | ||
Cisco | N/A | Cisco Fog Director version 1.0(0) | ||
Cisco | N/A | Cisco Universal Small Cell 5000 Series exécutant la version V3.4.2.x | ||
Cisco | N/A | Cisco Video Distribution Suite for Internet Streaming (VDS-IS/CDS-IS) | ||
Cisco | N/A | Cisco Service Control Operating System | ||
Cisco | N/A | Cisco Media Experience Engines (MXE) | ||
Cisco | N/A | Cisco Application Policy Infrastructure Controller (APIC) | ||
Cisco | N/A | Cisco Telepresence Integrator C Series | ||
Cisco | N/A | Cisco TelePresence EX Series | ||
Cisco | N/A | Cisco Edge 300 Digital Media Player versions antérieures à 1.6RB4_4 (disponible le 25 février 2016) | ||
Cisco | N/A | Cisco Intrusion Prevention System Solutions (IPS) versions antérieures à 7.3(05) Patch 1 (disponible le 30 avril 2016) | ||
Cisco | Unified Communications Manager | Cisco Unified Communications Manager (UCM) | ||
Cisco | N/A | Cisco TelePresence Profile Series | ||
Cisco | N/A | Cisco 3G Femtocell Wireless versions antérieures à SR10MR (disponible le 29 juillet 2016) | ||
Cisco | N/A | Cisco NAC Server versions antérieures à 4.9.5 (disponible le 19 février 2016) |
Title | Publication Time | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Cisco Digital Media Manager (DMM)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco NAC Guest Server versions ant\u00e9rieures \u00e0 2.1.0 (disponible le 19 f\u00e9vrier 2016)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "IOS-XR for Cisco Network Convergence System (NCS) 6000", "product": { "name": "IOS", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Intelligent Automation for Cloud", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco DCM Series 9900-Digital Content Manager versions ant\u00e9rieures \u00e0 18.0 (disponible le 31 mars 2016)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Video Surveillance Media Server", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco FireSIGHT System Software versions ant\u00e9rieures \u00e0 6.1 (disponible en juin 2016)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Unified Communications Manager Session Management Edition (SME)", "product": { "name": "Unified Communications Manager Session Management Edition", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Videoscape Policy and Resource Management", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Management Heartbeat Server versions ant\u00e9rieures \u00e0 RMS5.x MR (disponible le 29 juillet 2016)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Standalone rack server CIMC", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cloud Object Store (COS) versions ant\u00e9rieures \u00e0 3.8 (disponible le 9 avril 2016)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Universal Small Cell 7000 Series ex\u00e9cutant la version V3.4.2.x", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Finesse", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Hosted Collaboration Mediation Fulfillment", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco TelePresence Video Communication Server (VCS) versions ant\u00e9rieures \u00e0 8.7.1 (disponible le 22 f\u00e9vrier 2016)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco UCS Central", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco TelePresence Conductor versions ant\u00e9rieures \u00e0 XC4.2 (disponible le 30 mars 2016)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Application and Content Networking System (ACNS) versions ant\u00e9rieures \u00e0 5.5.41 (disponible le 29 f\u00e9vrier 2016)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Digital Media Manager", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Virtual Topology System", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco IP Interoperability and Collaboration System (IPICS)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Unified Communications Deployment Tools", "product": { "name": "Unified Communications", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Enterprise Content Delivery System (ECDS) versions ant\u00e9rieures \u00e0 2.6.7 (disponible le 30 avril 2016)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Quantum Virtualized Packet Core", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM) version 1.1", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco ASA CX et Cisco Prime Security Manager versions ant\u00e9rieures \u00e0 9.3.4.5 (disponible le 30 mai 2016)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Jabber Guest 10.0(2)", "product": { "name": "Jabber", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Intrusion Prevention System Solutions (IPS) versions ant\u00e9rieures \u00e0 7.1(11) Patch 1 (disponible le 31 mars 2016)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco 910 Industrial Router", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Expressway Series versions ant\u00e9rieures \u00e0 8.7.1 (disponible le 22 f\u00e9vrier 2016)", "product": { "name": "Expressway Series", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco TelePresence MX Series", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco TelePresence SX Series", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Clean Access Manager versions ant\u00e9rieures \u00e0 4.9.5 (disponible le 19 f\u00e9vrier 2016)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Video Delivery System Recorder (correctif disponible le 30 avril 2016)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Fog Director version 1.0(0)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Universal Small Cell 5000 Series ex\u00e9cutant la version V3.4.2.x", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Video Distribution Suite for Internet Streaming (VDS-IS/CDS-IS)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Service Control Operating System", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Media Experience Engines (MXE)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Application Policy Infrastructure Controller (APIC)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Telepresence Integrator C Series", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco TelePresence EX Series", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Edge 300 Digital Media Player versions ant\u00e9rieures \u00e0 1.6RB4_4 (disponible le 25 f\u00e9vrier 2016)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Intrusion Prevention System Solutions (IPS) versions ant\u00e9rieures \u00e0 7.3(05) Patch 1 (disponible le 30 avril 2016)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Unified Communications Manager (UCM)", "product": { "name": "Unified Communications Manager", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco TelePresence Profile Series", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco 3G Femtocell Wireless versions ant\u00e9rieures \u00e0 SR10MR (disponible le 29 juillet 2016)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco NAC Server versions ant\u00e9rieures \u00e0 4.9.5 (disponible le 19 f\u00e9vrier 2016)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2015-7973", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7973" }, { "name": "CVE-2015-7976", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7976" }, { "name": "CVE-2015-8158", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8158" }, { "name": "CVE-2015-7977", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7977" }, { "name": "CVE-2016-1305", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1305" }, { "name": "CVE-2015-8138", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8138" }, { "name": "CVE-2015-7974", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7974" }, { "name": "CVE-2015-7975", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7975" }, { "name": "CVE-2015-7978", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7978" }, { "name": "CVE-2015-8140", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8140" }, { "name": "CVE-2015-7979", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7979" }, { "name": "CVE-2015-8139", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8139" }, { "name": "CVE-2016-1306", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1306" } ], "initial_release_date": "2016-02-02T00:00:00", "last_revision_date": "2016-02-02T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160201-fd du 01 f\u00e9vrier 2016", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160201-fd" }, { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160201-apic-em du 01 f\u00e9vrier 2016", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160201-apic-em" }, { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160127-ntpd du 27 janvier 2016", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd" } ], "reference": "CERTFR-2016-AVI-045", "revisions": [ { "description": "version initiale.", "revision_date": "2016-02-02T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Injection de code indirecte \u00e0 distance" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Cisco\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es et une injection de code indirecte \u00e0 distance\n(XSS).\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160201-apic-em du 01 f\u00e9vrier 2016", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160127-ntpd du 27 janvier 2016", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160201-fd du 01 f\u00e9vrier 2016", "url": null } ] }
CERTFR-2017-AVI-111
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
N/A | N/A | Juniper EX Series avec IPv6 | ||
Juniper Networks | Junos OS | Junos OS versions 15.1 et postérieures avec BGP | ||
Juniper Networks | N/A | NorthStar Controller Application antérieures à la version 2.1.0 SP1 | ||
Juniper Networks | Junos OS | Junos OS | ||
Juniper Networks | N/A | Juniper SRX, vSRX et J-Series avec le serveur DNS Proxy actif |
Title | Publication Time | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Juniper EX Series avec IPv6", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Junos OS versions 15.1 et post\u00e9rieures avec BGP", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "NorthStar Controller Application ant\u00e9rieures \u00e0 la version 2.1.0 SP1", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Junos OS", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } }, { "description": "Juniper SRX, vSRX et J-Series avec le serveur DNS Proxy actif", "product": { "name": "N/A", "vendor": { "name": "Juniper Networks", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2016-9310", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9310" }, { "name": "CVE-2017-2322", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2322" }, { "name": "CVE-2015-7973", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7973" }, { "name": "CVE-2017-2316", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2316" }, { "name": "CVE-2017-2328", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2328" }, { "name": "CVE-2016-9131", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9131" }, { "name": "CVE-2015-1349", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1349" }, { "name": "CVE-2017-2333", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2333" }, { "name": "CVE-2015-5477", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5477" }, { "name": "CVE-2015-8158", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8158" }, { "name": "CVE-2015-2808", "url": "https://www.cve.org/CVERecord?id=CVE-2015-2808" }, { "name": "CVE-2015-3456", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3456" }, { "name": "CVE-2016-7429", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7429" }, { "name": "CVE-2017-2319", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2319" }, { "name": "CVE-2013-4450", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4450" }, { "name": "CVE-2016-1886", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1886" }, { "name": "CVE-2016-9311", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9311" }, { "name": "CVE-2015-8138", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8138" }, { "name": "CVE-2017-2334", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2334" }, { "name": "CVE-2017-2332", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2332" }, { "name": "CVE-2017-2340", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2340" }, { "name": "CVE-2017-2325", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2325" }, { "name": "CVE-2015-4620", "url": "https://www.cve.org/CVERecord?id=CVE-2015-4620" }, { "name": "CVE-2017-2329", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2329" }, { "name": "CVE-2017-2318", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2318" }, { "name": "CVE-2017-2320", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2320" }, { "name": "CVE-2015-8104", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8104" }, { "name": "CVE-2016-7427", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7427" }, { "name": "CVE-2017-2330", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2330" }, { "name": "CVE-2017-2324", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2324" }, { "name": "CVE-2017-2317", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2317" }, { "name": "CVE-2016-1014", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1014" }, { "name": "CVE-2016-2776", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2776" }, { "name": "CVE-2015-7979", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7979" }, { "name": "CVE-2015-3209", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3209" }, { "name": "CVE-2017-2331", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2331" }, { "name": "CVE-2017-2326", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2326" }, { "name": "CVE-2017-2315", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2315" }, { "name": "CVE-2016-7431", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7431" }, { "name": "CVE-2017-2313", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2313" }, { "name": "CVE-2017-2323", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2323" }, { "name": "CVE-2016-9147", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9147" }, { "name": "CVE-2017-2327", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2327" }, { "name": "CVE-2015-5307", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5307" }, { "name": "CVE-2016-8864", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8864" }, { "name": "CVE-2017-2321", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2321" }, { "name": "CVE-2017-2312", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2312" }, { "name": "CVE-2016-9444", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9444" } ], "initial_release_date": "2017-04-12T00:00:00", "last_revision_date": "2017-04-12T00:00:00", "links": [], "reference": "CERTFR-2017-AVI-111", "revisions": [ { "description": "version initiale.", "revision_date": "2017-04-12T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Juniper\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une ex\u00e9cution de code arbitraire et un d\u00e9ni de service \u00e0\ndistance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 JSA10776 Juniper du 12 avril 2017", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10776\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 JSA10778 Juniper du 12 avril 2017", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10778\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 JSA10781 Juniper du 12 avril 2017", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10781\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 JSA10785 Juniper du 12 avril 2017", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10785\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 JSA10780 Juniper du 12 avril 2017", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10780\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 JSA10783 Juniper du 12 avril 2017", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10783\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 JSA10786 Juniper du 12 avril 2017", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10786\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 JSA10777 Juniper du 12 avril 2017", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10777\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 JSA10784 Juniper du 12 avril 2017", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10784\u0026cat=SIRT_1\u0026actp=LIST" } ] }
CERTFR-2021-AVI-442
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Siemens | N/A | SIMATIC NET CP 443-1 OPC UA toutes versions | ||
Siemens | N/A | Solid Edge SE2021 versions antérieures à SE2021MP5 | ||
Siemens | N/A | Mendix SAML Module versions antérieures à V2.1.2 | ||
Siemens | N/A | TIM 1531 IRC (incl. SIPLUS NET variants) versions antérieures à V2.2 | ||
Siemens | N/A | Simcenter Femap 2021.1 versions antérieures à V2021.1.MP3 | ||
Siemens | N/A | T2Go et Teamcenter Visualization versions antérieures à V13.1.0.3 | ||
Siemens | N/A | SIMATIC RF360R, RF615R, RF680R et RF685R | ||
Siemens | N/A | Solid Edge SE2020 versions antérieures à 2020MP14 | ||
Siemens | N/A | Simcenter Femap 2020.2 versions antérieures à V2020.2.MP3 | ||
Siemens | N/A | SIMATIC RF166C, RF185C, RF186C, RF186CI, RF188C et RF188CI versions antérieures à V1.3.2 |
Title | Publication Time | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "SIMATIC NET CP 443-1 OPC UA toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Solid Edge SE2021 versions ant\u00e9rieures \u00e0 SE2021MP5", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Mendix SAML Module versions ant\u00e9rieures \u00e0 V2.1.2", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "TIM 1531 IRC (incl. SIPLUS NET variants) versions ant\u00e9rieures \u00e0 V2.2", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Simcenter Femap 2021.1 versions ant\u00e9rieures \u00e0 V2021.1.MP3", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "T2Go et Teamcenter Visualization versions ant\u00e9rieures \u00e0 V13.1.0.3", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC RF360R, RF615R, RF680R et RF685R", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Solid Edge SE2020 versions ant\u00e9rieures \u00e0 2020MP14", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Simcenter Femap 2020.2 versions ant\u00e9rieures \u00e0 V2020.2.MP3", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC RF166C, RF185C, RF186C, RF186CI, RF188C et RF188CI versions ant\u00e9rieures \u00e0 V1.3.2", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2016-1547", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1547" }, { "name": "CVE-2016-4956", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4956" }, { "name": "CVE-2021-33712", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33712" }, { "name": "CVE-2020-8169", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8169" }, { "name": "CVE-2016-4953", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4953" }, { "name": "CVE-2021-27399", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27399" }, { "name": "CVE-2020-8286", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8286" }, { "name": "CVE-2016-1550", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1550" }, { "name": "CVE-2015-7705", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7705" }, { "name": "CVE-2021-31343", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31343" }, { "name": "CVE-2016-7433", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7433" }, { "name": "CVE-2016-4955", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4955" }, { "name": "CVE-2015-7853", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7853" }, { "name": "CVE-2015-8138", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8138" }, { "name": "CVE-2016-4954", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4954" }, { "name": "CVE-2021-27387", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27387" }, { "name": "CVE-2021-31342", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31342" }, { "name": "CVE-2016-2518", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2518" }, { "name": "CVE-2018-0732", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0732" }, { "name": "CVE-2016-7431", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7431" }, { "name": "CVE-2021-31340", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31340" }, { "name": "CVE-2021-27390", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27390" }, { "name": "CVE-2017-6458", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6458" }, { "name": "CVE-2016-1548", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1548" }, { "name": "CVE-2016-9042", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9042" } ], "initial_release_date": "2021-06-08T00:00:00", "last_revision_date": "2021-06-08T00:00:00", "links": [], "reference": "CERTFR-2021-AVI-442", "revisions": [ { "description": "Version initiale", "revision_date": "2021-06-08T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-208356 du 08 juin 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-208356.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-645530 du 08 juin 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-645530.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-200951 du 08 juin 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-211752 du 08 juin 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-419820 du 08 juin 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-133038 du 08 juin 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-133038.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-787292 du 08 juin 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-787292.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-522654 du 08 juin 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-522654.pdf" } ] }
CERTFR-2017-AVI-212
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "CTPView 7.1, 7.2 et 7.3", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "CTPOS 7.0, 7.1, 7.2 et 7.3", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "ScreenOS versions ant\u00e9rieures \u00e0 6.3.0r24", "product": { "name": "N/A", "vendor": { "name": "N/A", "scada": false } } }, { "description": "Junos OS toutes versions sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "Junos OS", "vendor": { "name": "Juniper Networks", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2016-9310", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9310" }, { "name": "CVE-2017-2341", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2341" }, { "name": "CVE-2017-3135", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3135" }, { "name": "CVE-2017-2346", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2346" }, { "name": "CVE-2016-7426", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7426" }, { "name": "CVE-2017-2347", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2347" }, { "name": "CVE-2017-2338", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2338" }, { "name": "CVE-2017-2348", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2348" }, { "name": "CVE-2017-3731", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3731" }, { "name": "CVE-2016-7433", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7433" }, { "name": "CVE-2016-7429", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7429" }, { "name": "CVE-2016-9311", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9311" }, { "name": "CVE-2015-8138", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8138" }, { "name": "CVE-2016-7434", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7434" }, { "name": "CVE-2017-2336", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2336" }, { "name": "CVE-2017-2337", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2337" }, { "name": "CVE-2016-7427", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7427" }, { "name": "CVE-2017-3732", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3732" }, { "name": "CVE-2017-10605", "url": "https://www.cve.org/CVERecord?id=CVE-2017-10605" }, { "name": "CVE-2017-2344", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2344" }, { "name": "CVE-2017-2345", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2345" }, { "name": "CVE-2017-2343", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2343" }, { "name": "CVE-2017-2339", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2339" }, { "name": "CVE-2016-7431", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7431" }, { "name": "CVE-2016-7055", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7055" }, { "name": "CVE-2016-1887", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1887" }, { "name": "CVE-2016-9312", "url": "https://www.cve.org/CVERecord?id=CVE-2016-9312" }, { "name": "CVE-2016-7428", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7428" }, { "name": "CVE-2016-3074", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3074" }, { "name": "CVE-2017-2314", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2314" }, { "name": "CVE-2017-2342", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2342" }, { "name": "CVE-2017-2335", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2335" } ], "initial_release_date": "2017-07-12T00:00:00", "last_revision_date": "2017-07-12T00:00:00", "links": [], "reference": "CERTFR-2017-AVI-212", "revisions": [ { "description": "version initiale.", "revision_date": "2017-07-12T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Juniper\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une ex\u00e9cution de code arbitraire et un d\u00e9ni de service \u00e0\ndistance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10797 du 12 juillet 2017", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10797\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10794 du 12 juillet 2017", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10794\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10789 du 12 juillet 2017", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10789\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10800 du 12 juillet 2017", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10800\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10793 du 12 juillet 2017", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10793\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10791 du 12 juillet 2017", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10791\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10775 du 12 juillet 2017", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10775\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10795 du 12 juillet 2017", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10795\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10790 du 12 juillet 2017", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10790\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10779 du 12 juillet 2017", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10779\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10787 du 12 juillet 2017", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10787\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10799 du 12 juillet 2017", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10799\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10796 du 12 juillet 2017", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10796\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10792 du 12 juillet 2017", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10792\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10798 du 12 juillet 2017", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10798\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10782 du 12 juillet 2017", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10782\u0026cat=SIRT_1\u0026actp=LIST" } ] }
CERTFR-2021-AVI-255
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Siemens. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Siemens | N/A | LOGO! Soft Comfort toutes versions | ||
Siemens | N/A | Siveillance Video Open Network Bridge:2019 R2 | ||
Siemens | N/A | Solid Edge SE2021 versions antérieures à SE2021MP4 | ||
Siemens | N/A | SIMATIC NET CP 443-1 Advanced (incl. SIPLUSvariants) versions antérieures à V3.2.9 | ||
Siemens | N/A | Siveillance Video Open Network Bridge:2019 R3 | ||
Siemens | N/A | Nucleus NET versions antérieures à 5.2 | ||
Siemens | N/A | TIM 3V-IE / TIM 3V-IE Advanced (incl. SIPLUSNET variants) versions antérieures à V2.6.0 | ||
Siemens | N/A | SiNVR/SiVMS Video Server toutes versions | ||
Siemens | N/A | Nucleus RTOS versions contenant le module DNS affecté | ||
Siemens | N/A | SIMATIC NET CP 343-1 Advanced (incl. SIPLUSvariants) versions antérieures à V3.0.44 | ||
Siemens | N/A | Solid Edge SE2020 toutes versions | ||
Siemens | N/A | SIMATIC NET CP 343-1 Lean (incl. SIPLUS vari-ants) versions antérieures à V3.1.1 | ||
Siemens | N/A | SIMATIC NET CP 443-5 Basic (incl. SIPLUS vari-ants) toutes versions | ||
Siemens | N/A | Opcenter Quality versions antérieures à 12.2 | ||
Siemens | N/A | Siveillance Video Open Network Bridge:2019 R1 | ||
Siemens | N/A | SIMATIC NET CP 443-5 Extended toutes versions | ||
Siemens | N/A | VSTAR versions contenant le module DNS affecté | ||
Siemens | N/A | Control Center Server (CCS) toutes versions | ||
Siemens | N/A | TIM 4R-IE (incl. SIPLUS NET variants) toutes versions | ||
Siemens | N/A | Siveillance Video Open Network Bridge:2020 R1 | ||
Siemens | N/A | SINEMA Remote Connect Server versions antérieures à 3.0 | ||
Siemens | N/A | Siveillance Video Open Network Bridge:2020 R2 | ||
Siemens | N/A | SIMATIC NET CP 343-1 Standard (incl. SIPLUSvariants) versions antérieures à V3.1.1 | ||
Siemens | N/A | SIMATIC NET CP 443-1 Standard (incl. SIPLUSvariants) versions antérieures à V3.2.9 | ||
Siemens | N/A | SIMATIC NET CP 342-5 (incl. SIPLUS variants) toutes versions | ||
Siemens | N/A | Siveillance Video Open Network Bridge:2018 R2 | ||
Siemens | N/A | Nucleus ReadyStart toutes versions | ||
Siemens | N/A | Nucleus 4 versions antérieures à 4.1.0 | ||
Siemens | N/A | Siveillance Video Open Network Bridge:2018 R3 | ||
Siemens | N/A | QMS Automotive versions antérieures à 12.30 | ||
Siemens | N/A | Tecnomatix RobotExpert versions antérieures à 16.1 | ||
Siemens | N/A | TIM 3V-IE DNP3 (incl. SIPLUS NET variants) versions antérieures à V3.1.0 | ||
Siemens | N/A | Siveillance Video Open Network Bridge:2020 R3 | ||
Siemens | N/A | Nucleus Source Code versions contenant le module DNS affecté | ||
Siemens | N/A | TIM 4R-IE DNP3 (incl. SIPLUS NET variants) toutes versions | ||
Siemens | N/A | SIMOTICS CONNECT 400 toutes verions |
Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "LOGO! Soft Comfort toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Siveillance Video Open Network Bridge:2019 R2", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Solid Edge SE2021 versions ant\u00e9rieures \u00e0 SE2021MP4", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC NET CP 443-1 Advanced (incl. SIPLUSvariants) versions ant\u00e9rieures \u00e0 V3.2.9", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Siveillance Video Open Network Bridge:2019 R3", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Nucleus NET versions ant\u00e9rieures \u00e0 5.2", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "TIM 3V-IE / TIM 3V-IE Advanced (incl. SIPLUSNET variants) versions ant\u00e9rieures \u00e0 V2.6.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SiNVR/SiVMS Video Server toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Nucleus RTOS versions contenant le module DNS affect\u00e9", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC NET CP 343-1 Advanced (incl. SIPLUSvariants) versions ant\u00e9rieures \u00e0 V3.0.44", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Solid Edge SE2020 toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC NET CP 343-1 Lean (incl. SIPLUS vari-ants) versions ant\u00e9rieures \u00e0 V3.1.1", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC NET CP 443-5 Basic (incl. SIPLUS vari-ants) toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Opcenter Quality versions ant\u00e9rieures \u00e0 12.2", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Siveillance Video Open Network Bridge:2019 R1", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC NET CP 443-5 Extended toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "VSTAR versions contenant le module DNS affect\u00e9", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Control Center Server (CCS) toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "TIM 4R-IE (incl. SIPLUS NET variants) toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Siveillance Video Open Network Bridge:2020 R1", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SINEMA Remote Connect Server versions ant\u00e9rieures \u00e0 3.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Siveillance Video Open Network Bridge:2020 R2", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC NET CP 343-1 Standard (incl. SIPLUSvariants) versions ant\u00e9rieures \u00e0 V3.1.1", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC NET CP 443-1 Standard (incl. SIPLUSvariants) versions ant\u00e9rieures \u00e0 V3.2.9", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMATIC NET CP 342-5 (incl. SIPLUS variants) toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Siveillance Video Open Network Bridge:2018 R2", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Nucleus ReadyStart toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Nucleus 4 versions ant\u00e9rieures \u00e0 4.1.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Siveillance Video Open Network Bridge:2018 R3", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "QMS Automotive versions ant\u00e9rieures \u00e0 12.30", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Tecnomatix RobotExpert versions ant\u00e9rieures \u00e0 16.1", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "TIM 3V-IE DNP3 (incl. SIPLUS NET variants) versions ant\u00e9rieures \u00e0 V3.1.0", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Siveillance Video Open Network Bridge:2020 R3", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "Nucleus Source Code versions contenant le module DNS affect\u00e9", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "TIM 4R-IE DNP3 (incl. SIPLUS NET variants) toutes versions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } }, { "description": "SIMOTICS CONNECT 400 toutes verions", "product": { "name": "N/A", "vendor": { "name": "Siemens", "scada": true } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2020-27009", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27009" }, { "name": "CVE-2015-7855", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7855" }, { "name": "CVE-2019-18339", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18339" }, { "name": "CVE-2016-1547", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1547" }, { "name": "CVE-2015-7973", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7973" }, { "name": "CVE-2016-4953", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4953" }, { "name": "CVE-2021-27389", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27389" }, { "name": "CVE-2021-27382", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27382" }, { "name": "CVE-2020-27736", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27736" }, { "name": "CVE-2021-27380", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27380" }, { "name": "CVE-2015-5219", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5219" }, { "name": "CVE-2016-1550", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1550" }, { "name": "CVE-2015-7977", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7977" }, { "name": "CVE-2015-7705", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7705" }, { "name": "CVE-2021-27392", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27392" }, { "name": "CVE-2019-19956", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19956" }, { "name": "CVE-2021-25663", "url": "https://www.cve.org/CVERecord?id=CVE-2021-25663" }, { "name": "CVE-2020-15795", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15795" }, { "name": "CVE-2015-8138", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8138" }, { "name": "CVE-2016-4954", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4954" }, { "name": "CVE-2021-25664", "url": "https://www.cve.org/CVERecord?id=CVE-2021-25664" }, { "name": "CVE-2020-25243", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25243" }, { "name": "CVE-2015-7974", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7974" }, { "name": "CVE-2015-8214", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8214" }, { "name": "CVE-2019-19299", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19299" }, { "name": "CVE-2020-28385", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28385" }, { "name": "CVE-2021-25678", "url": "https://www.cve.org/CVERecord?id=CVE-2021-25678" }, { "name": "CVE-2020-7595", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7595" }, { "name": "CVE-2021-27393", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27393" }, { "name": "CVE-2020-25244", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25244" }, { "name": "CVE-2019-18340", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18340" }, { "name": "CVE-2021-25670", "url": "https://www.cve.org/CVERecord?id=CVE-2021-25670" }, { "name": "CVE-2015-7979", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7979" }, { "name": "CVE-2015-7871", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7871" }, { "name": "CVE-2020-27738", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27738" }, { "name": "CVE-2019-19298", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19298" }, { "name": "CVE-2020-26997", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26997" }, { "name": "CVE-2019-19291", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19291" }, { "name": "CVE-2020-27737", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27737" }, { "name": "CVE-2019-19297", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19297" }, { "name": "CVE-2016-1548", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1548" }, { "name": "CVE-2021-25677", "url": "https://www.cve.org/CVERecord?id=CVE-2021-25677" }, { "name": "CVE-2019-19296", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19296" } ], "initial_release_date": "2021-04-14T00:00:00", "last_revision_date": "2021-04-14T00:00:00", "links": [], "reference": "CERTFR-2021-AVI-255", "revisions": [ { "description": "Version initiale", "revision_date": "2021-04-14T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "D\u00e9ni de service" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nSiemens. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service et un\ncontournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Siemens", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-788287 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-788287.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-248289 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-248289.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-853866 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-853866.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-185699 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-185699.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-983300 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-983300.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-844761 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-844761.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-163226 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-163226.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-763427 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-763427.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-497656 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-761617 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761617.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-669158 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-669158.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-574442 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-574442.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-705111 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-705111.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-292794 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Siemens ssa-761844 du 13 avril 2021", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-761844.pdf" } ] }
CERTFR-2016-AVI-153
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans les produits Cisco. Elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Cisco | N/A | Cisco WebEx Meetings Server version 2.6 | ||
Cisco | N/A | Cisco Prime Collaboration Assurance Software versions 10.5 à 11.0 | ||
Cisco | N/A | Cisco Finesse | ||
Cisco | N/A | Cisco ASA 5585-X FirePOWER SSP versions 6.0.x antérieures à 6.0.1 | ||
Cisco | N/A | Cisco APIC-EM version 1.0(1) | ||
Cisco | N/A | Cisco ASA 5585-X FirePOWER SSP versions 5.3.1.x antérieures à 5.3.1.7 | ||
Cisco | N/A | Cisco FirePOWER versions 5.3.x antérieures à 5.3.0.7 | ||
Cisco | N/A | Voir sur le site du constructeur pour les systèmes affectés par les vulnérabilités du Network Time Protocol Daemon (cf. section Documentation) | ||
Cisco | N/A | Cisco ASA 5585-X FirePOWER SSP versions 5.4.1.x antérieures à 5.4.1.6 | ||
Cisco | N/A | Cisco ASA 5585-X FirePOWER SSP versions 5.4.0.x antérieures à 5.4.0.7 | ||
Cisco | N/A | Cisco Information Server version 6.2 | ||
Cisco | N/A | Cisco FirePOWER versions 5.4.x antérieures à 5.4.0.4 | ||
Cisco | N/A | Cisco TelePresence EX Series, Integrator C Series, MX Series, Profile Series, SX Series, SX Quick Set Series, VX Clinical Assistant et VX Tactical exécutant les versions suivantes : TC 7.2.0, TC 7.2.1, TC 7.3.0, TC 7.3.1, TC 7.3.2, TC 7.3.3, TC 7.3.4, TC 7.3.5, CE 8.0.0, CE 8.0.1, ou CE 8.1.0 |
Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Cisco WebEx Meetings Server version 2.6", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Prime Collaboration Assurance Software versions 10.5 \u00e0 11.0", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Finesse", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco ASA 5585-X FirePOWER SSP versions 6.0.x ant\u00e9rieures \u00e0 6.0.1", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco APIC-EM version 1.0(1)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco ASA 5585-X FirePOWER SSP versions 5.3.1.x ant\u00e9rieures \u00e0 5.3.1.7", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco FirePOWER versions 5.3.x ant\u00e9rieures \u00e0 5.3.0.7", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Voir sur le site du constructeur pour les syst\u00e8mes affect\u00e9s par les vuln\u00e9rabilit\u00e9s du Network Time Protocol Daemon (cf. section Documentation)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco ASA 5585-X FirePOWER SSP versions 5.4.1.x ant\u00e9rieures \u00e0 5.4.1.6", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco ASA 5585-X FirePOWER SSP versions 5.4.0.x ant\u00e9rieures \u00e0 5.4.0.7", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco Information Server version 6.2", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco FirePOWER versions 5.4.x ant\u00e9rieures \u00e0 5.4.0.4", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco TelePresence EX Series, Integrator C Series, MX Series, Profile Series, SX Series, SX Quick Set Series, VX Clinical Assistant et VX Tactical ex\u00e9cutant les versions suivantes : TC 7.2.0, TC 7.2.1, TC 7.3.0, TC 7.3.1, TC 7.3.2, TC 7.3.3, TC 7.3.4, TC 7.3.5, CE 8.0.0, CE 8.0.1, ou CE 8.1.0", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2016-1547", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1547" }, { "name": "CVE-2016-1387", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1387" }, { "name": "CVE-2016-2105", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2105" }, { "name": "CVE-2016-2176", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2176" }, { "name": "CVE-2016-1550", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1550" }, { "name": "CVE-2016-1343", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1343" }, { "name": "CVE-2016-1549", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1549" }, { "name": "CVE-2015-8138", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8138" }, { "name": "CVE-2016-1368", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1368" }, { "name": "CVE-2016-2107", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2107" }, { "name": "CVE-2016-1551", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1551" }, { "name": "CVE-2016-2106", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2106" }, { "name": "CVE-2016-1373", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1373" }, { "name": "CVE-2016-1392", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1392" }, { "name": "CVE-2016-2516", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2516" }, { "name": "CVE-2016-2518", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2518" }, { "name": "CVE-2016-2519", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2519" }, { "name": "CVE-2016-1369", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1369" }, { "name": "CVE-2015-7704", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7704" }, { "name": "CVE-2016-2517", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2517" }, { "name": "CVE-2016-2109", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2109" }, { "name": "CVE-2016-2108", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2108" }, { "name": "CVE-2016-1386", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1386" }, { "name": "CVE-2016-1389", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1389" }, { "name": "CVE-2016-1548", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1548" } ], "initial_release_date": "2016-05-06T00:00:00", "last_revision_date": "2016-05-06T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160428-ntpd du 28 avril 2016", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd" }, { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160504-tpxml du 04 mai 2016", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-tpxml" }, { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160428-apic du 28 avril 2016", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-apic" }, { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160428-cis du 04 mai 2016", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-cis" }, { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160428-cwms du 28 avril 2016", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-cwms" }, { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160504-finesse du 04 mai 2016", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-finesse" }, { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160504-openssl du 04 mai 2016", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-openssl" }, { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160504-fpkern du 04 mai 2016", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-fpkern" }, { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160504-firepower du 04 mai 2016", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160504-firepower" }, { "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160503-pca du 04 mai 2016", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160503-pca" } ], "reference": "CERTFR-2016-AVI-153", "revisions": [ { "description": "version initiale.", "revision_date": "2016-05-06T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Cisco\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance, un contournement\nde la politique de s\u00e9curit\u00e9 et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160428-apic du 28 avril 2016", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160428-cwms du 28 avril 2016", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160428-cis du 28 avril 2016", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160504-openssl du 04 mai 2016", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160504-firepower du 04 mai 2016", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160504-fpkern du 04 mai 2016", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160504-finesse du 04 mai 2016", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160428-ntpd du 28 avril 2016", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160503-pca du 03 mai 2016", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20160504-tpxml du 04 mai 2016", "url": null } ] }
fkie_cve-2015-8138
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
cve@mitre.org | http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.html | Third Party Advisory | |
cve@mitre.org | http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176434.html | Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html | Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html | Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html | Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html | Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html | Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html | Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html | Third Party Advisory | |
cve@mitre.org | http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html | Third Party Advisory | |
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2016-0063.html | Third Party Advisory | |
cve@mitre.org | http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security | Vendor Advisory | |
cve@mitre.org | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd | Third Party Advisory | |
cve@mitre.org | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd | Third Party Advisory | |
cve@mitre.org | http://www.debian.org/security/2016/dsa-3629 | Third Party Advisory | |
cve@mitre.org | http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | ||
cve@mitre.org | http://www.securityfocus.com/bid/81811 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securitytracker.com/id/1034782 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.ubuntu.com/usn/USN-3096-1 | Third Party Advisory | |
cve@mitre.org | https://bto.bluecoat.com/security-advisory/sa113 | Third Party Advisory | |
cve@mitre.org | https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf | ||
cve@mitre.org | https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf | ||
cve@mitre.org | https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us | ||
cve@mitre.org | https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us | ||
cve@mitre.org | https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc | ||
cve@mitre.org | https://security.gentoo.org/glsa/201607-15 | Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20171004-0002/ | ||
cve@mitre.org | https://security.netapp.com/advisory/ntap-20171031-0001/ | ||
cve@mitre.org | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161123-ntpd | Third Party Advisory | |
cve@mitre.org | https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11 | ||
cve@mitre.org | https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19 | ||
cve@mitre.org | https://www.kb.cert.org/vuls/id/718152 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176434.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-0063.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2016/dsa-3629 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/81811 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1034782 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3096-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bto.bluecoat.com/security-advisory/sa113 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf | ||
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf | ||
af854a3a-2127-422b-91ae-364da2661108 | https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03750en_us | ||
af854a3a-2127-422b-91ae-364da2661108 | https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03766en_us | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201607-15 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20171004-0002/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20171031-0001/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161123-ntpd | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/718152 | Third Party Advisory, US Government Resource |
Vendor | Product | Version | |
---|---|---|---|
ntp | ntp | * | |
ntp | ntp | 4.3.0 | |
ntp | ntp | 4.3.1 | |
ntp | ntp | 4.3.2 | |
ntp | ntp | 4.3.3 | |
ntp | ntp | 4.3.4 | |
ntp | ntp | 4.3.5 | |
ntp | ntp | 4.3.6 | |
ntp | ntp | 4.3.7 | |
ntp | ntp | 4.3.8 | |
ntp | ntp | 4.3.10 | |
ntp | ntp | 4.3.11 | |
ntp | ntp | 4.3.12 | |
ntp | ntp | 4.3.13 | |
ntp | ntp | 4.3.14 | |
ntp | ntp | 4.3.15 | |
ntp | ntp | 4.3.16 | |
ntp | ntp | 4.3.17 | |
ntp | ntp | 4.3.18 | |
ntp | ntp | 4.3.19 | |
ntp | ntp | 4.3.20 | |
ntp | ntp | 4.3.21 | |
ntp | ntp | 4.3.22 | |
ntp | ntp | 4.3.23 | |
ntp | ntp | 4.3.24 | |
ntp | ntp | 4.3.25 | |
ntp | ntp | 4.3.26 | |
ntp | ntp | 4.3.27 | |
ntp | ntp | 4.3.28 | |
ntp | ntp | 4.3.29 | |
ntp | ntp | 4.3.30 | |
ntp | ntp | 4.3.31 | |
ntp | ntp | 4.3.32 | |
ntp | ntp | 4.3.33 | |
ntp | ntp | 4.3.34 | |
ntp | ntp | 4.3.35 | |
ntp | ntp | 4.3.36 | |
ntp | ntp | 4.3.37 | |
ntp | ntp | 4.3.38 | |
ntp | ntp | 4.3.39 | |
ntp | ntp | 4.3.40 | |
ntp | ntp | 4.3.41 | |
ntp | ntp | 4.3.42 | |
ntp | ntp | 4.3.43 | |
ntp | ntp | 4.3.44 | |
ntp | ntp | 4.3.45 | |
ntp | ntp | 4.3.46 | |
ntp | ntp | 4.3.47 | |
ntp | ntp | 4.3.48 | |
ntp | ntp | 4.3.49 | |
ntp | ntp | 4.3.50 | |
ntp | ntp | 4.3.51 | |
ntp | ntp | 4.3.52 | |
ntp | ntp | 4.3.53 | |
ntp | ntp | 4.3.54 | |
ntp | ntp | 4.3.55 | |
ntp | ntp | 4.3.56 | |
ntp | ntp | 4.3.57 | |
ntp | ntp | 4.3.58 | |
ntp | ntp | 4.3.59 | |
ntp | ntp | 4.3.60 | |
ntp | ntp | 4.3.61 | |
ntp | ntp | 4.3.62 | |
ntp | ntp | 4.3.63 | |
ntp | ntp | 4.3.64 | |
ntp | ntp | 4.3.65 | |
ntp | ntp | 4.3.66 | |
ntp | ntp | 4.3.67 | |
ntp | ntp | 4.3.68 | |
ntp | ntp | 4.3.69 | |
ntp | ntp | 4.3.70 | |
ntp | ntp | 4.3.71 | |
ntp | ntp | 4.3.72 | |
ntp | ntp | 4.3.73 | |
ntp | ntp | 4.3.74 | |
ntp | ntp | 4.3.75 | |
ntp | ntp | 4.3.76 | |
ntp | ntp | 4.3.77 | |
ntp | ntp | 4.3.78 | |
ntp | ntp | 4.3.79 | |
ntp | ntp | 4.3.80 | |
ntp | ntp | 4.3.81 | |
ntp | ntp | 4.3.82 | |
ntp | ntp | 4.3.83 | |
ntp | ntp | 4.3.84 | |
ntp | ntp | 4.3.85 | |
ntp | ntp | 4.3.86 | |
ntp | ntp | 4.3.87 | |
ntp | ntp | 4.3.88 | |
ntp | ntp | 4.3.89 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ntp:ntp:*:p5:*:*:*:*:*:*", "matchCriteriaId": "99442254-E77A-43F7-8A9B-FC918AC336A6", "versionEndIncluding": "4.2.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "0C1CCF6F-74C6-42D7-B88B-36ED73BB1F8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B23D9009-DF45-44C1-80DF-CEEC9B9E3F20", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "43921601-667E-4415-83BE-E5B39D969BD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "75DD9C02-0C46-4785-8D77-C5465E4ED967", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "A497BADE-0516-494F-89FA-EAFC6AD17F7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "4298439A-EAF2-4CAA-990B-4AA37E7A0E8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "30E9C822-C04A-4908-9596-76F9FB561206", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "12EBD400-8EC1-4F9C-B600-85B8FF3BDEA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "BE6CFF4C-2620-4FD6-91A2-C0D0DAA4287D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "121ED6C5-8985-4DEF-9040-2AC63582E596", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "566B4B99-8B4F-4ED8-B2DC-D90EC71ECB99", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "68499DA4-64EF-412F-A434-8E0F78D77CE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "836C5AC9-463F-4703-81B9-7B5484F47A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "FED14811-8F49-4796-BADD-DB7973EC32DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "D4EB2830-ADE5-4C87-964E-16748BF88EF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "8C0284FD-2933-4160-80D2-53B32CD73287", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.17:*:*:*:*:*:*:*", "matchCriteriaId": "D9AB963A-7284-433F-9890-5AE402E4E000", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.18:*:*:*:*:*:*:*", "matchCriteriaId": "EEDEFF7A-D964-4D9A-93BF-41E9D16EA793", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.19:*:*:*:*:*:*:*", "matchCriteriaId": "9C434153-911C-4F07-ADD0-0EAB47F96E89", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.20:*:*:*:*:*:*:*", "matchCriteriaId": "8183B043-8B96-4A8B-A5C9-544D4F1CED8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.21:*:*:*:*:*:*:*", "matchCriteriaId": "6DE349AB-44CB-4263-80CE-59DFD572B363", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.22:*:*:*:*:*:*:*", "matchCriteriaId": "3DB55DF6-567F-4B6A-81E1-9013914416D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.23:*:*:*:*:*:*:*", "matchCriteriaId": "80727B0B-AB5E-46CC-9DDF-F319C2D9B242", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.24:*:*:*:*:*:*:*", "matchCriteriaId": "E0755962-2D5F-41E6-9BDB-C2ECBCCD2818", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.25:*:*:*:*:*:*:*", "matchCriteriaId": "2EBAADB5-FA32-4CF9-A4B2-51EEA300B0EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.26:*:*:*:*:*:*:*", "matchCriteriaId": "A202FDAD-D757-4850-9D1E-C31B0F3BA718", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.27:*:*:*:*:*:*:*", "matchCriteriaId": "B6A345D7-DFC0-4E0D-AAAB-8206C35F63D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.28:*:*:*:*:*:*:*", "matchCriteriaId": "C4069EF5-DC7D-4487-8636-AC2EAB17BAC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.29:*:*:*:*:*:*:*", "matchCriteriaId": "73DF3A5C-F1D9-468E-BD08-5E2578898DEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.30:*:*:*:*:*:*:*", "matchCriteriaId": "0858AE44-4B0A-4941-B4A8-937B557D1448", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.31:*:*:*:*:*:*:*", "matchCriteriaId": "979C84FF-CB21-4819-B3CA-1A55FDF20BD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.32:*:*:*:*:*:*:*", "matchCriteriaId": "94709B39-C394-4B44-A362-9429F4CB9D50", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.33:*:*:*:*:*:*:*", "matchCriteriaId": "2E4526AC-6BCC-43A5-B501-263D0ED0655B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.34:*:*:*:*:*:*:*", "matchCriteriaId": "E04FF6B4-CD1C-4AC1-B286-D6AB705D680B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.35:*:*:*:*:*:*:*", "matchCriteriaId": "1FAFA0C8-1349-43A4-BDAC-3B5A601B9FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.36:*:*:*:*:*:*:*", "matchCriteriaId": "6BA130B1-DD20-4E98-963F-61E85A09E29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.37:*:*:*:*:*:*:*", "matchCriteriaId": "9AAC9B73-5020-47C9-803E-ABB6162AADE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.38:*:*:*:*:*:*:*", "matchCriteriaId": "D2A6B7B5-3AC9-4442-BD91-3783C2B4235C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.39:*:*:*:*:*:*:*", "matchCriteriaId": "D72F5C09-520B-486C-AD9A-9CBBFE6487CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.40:*:*:*:*:*:*:*", "matchCriteriaId": "097DED37-D3F3-45C4-B131-1C4294406722", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.41:*:*:*:*:*:*:*", "matchCriteriaId": "85A4F607-0A9D-4F84-B50D-28C54E6EDC06", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.42:*:*:*:*:*:*:*", "matchCriteriaId": "8C689CAF-632A-4FF2-8C86-541EEDD574E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.43:*:*:*:*:*:*:*", "matchCriteriaId": "7B0ACF5B-BBA9-4B6C-B19D-B8AEF7212781", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.44:*:*:*:*:*:*:*", "matchCriteriaId": "E09C8254-73DC-4AFA-A250-A8192DC917F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.45:*:*:*:*:*:*:*", "matchCriteriaId": "D344FA12-3C5F-418B-9209-EA8BDD230074", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.46:*:*:*:*:*:*:*", "matchCriteriaId": "D1C3A62A-C6F6-4B2E-A254-CDA12BD34DBB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.47:*:*:*:*:*:*:*", "matchCriteriaId": "073A0AFF-C5C6-422E-BD63-2353AA4B58E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.48:*:*:*:*:*:*:*", "matchCriteriaId": "59B5DA29-4139-405D-8AA8-23FAECBBC5CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.49:*:*:*:*:*:*:*", "matchCriteriaId": "73F4D15D-6D2A-4730-B7CF-21284E92FEFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.50:*:*:*:*:*:*:*", "matchCriteriaId": "79A0C6AB-813F-4417-A98E-33FBB7AAB939", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.51:*:*:*:*:*:*:*", "matchCriteriaId": "815ABF0E-ED94-4426-8889-D3C2AECACC26", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.52:*:*:*:*:*:*:*", "matchCriteriaId": "894612F1-8C51-4F66-AFE7-D8077F63E562", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.53:*:*:*:*:*:*:*", "matchCriteriaId": "63FD3D1E-08F8-4C7F-876C-47E88386B83E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.54:*:*:*:*:*:*:*", "matchCriteriaId": "9C068E27-A3DD-4FD2-81FB-2CFEC3C047CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.55:*:*:*:*:*:*:*", "matchCriteriaId": "E21A12E6-0802-4BDC-AF71-50D7D0433B87", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.56:*:*:*:*:*:*:*", "matchCriteriaId": "DC7EE44A-7D8B-41A5-82A6-04AEE50278CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.57:*:*:*:*:*:*:*", "matchCriteriaId": "6862529A-1AE5-4E2D-A4B0-E351D1900C64", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.58:*:*:*:*:*:*:*", "matchCriteriaId": "4C6B6711-0F75-4FEA-8917-04391FC9D378", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.59:*:*:*:*:*:*:*", "matchCriteriaId": "6AC0249C-3CFC-4CD3-9481-9F6BE1FC5E31", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.60:*:*:*:*:*:*:*", "matchCriteriaId": "3BE639D9-0B1E-4DFB-B275-D11665FDA4AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.61:*:*:*:*:*:*:*", "matchCriteriaId": "B35E9C41-0F2A-4790-B996-8EC00FA863F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.62:*:*:*:*:*:*:*", "matchCriteriaId": "28BAB268-3A70-4422-9C6C-49E6453D750D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.63:*:*:*:*:*:*:*", "matchCriteriaId": "9A5960F1-DDA9-4885-952F-450EC00B5C9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.64:*:*:*:*:*:*:*", "matchCriteriaId": "E725D449-BBC2-40E3-BF53-D9BF7B4F57D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.65:*:*:*:*:*:*:*", "matchCriteriaId": "B10975CB-56EB-44D0-BDEF-60484B6BD85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.66:*:*:*:*:*:*:*", "matchCriteriaId": "3EE56C0F-0AF4-45CF-ACA2-0E583BBB3187", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.67:*:*:*:*:*:*:*", "matchCriteriaId": "16A4A1AC-ED08-4EFE-A826-1BB1B5CAB34E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.68:*:*:*:*:*:*:*", "matchCriteriaId": "BF9D7AD6-6BDB-4519-B9F8-3181E21850FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.69:*:*:*:*:*:*:*", "matchCriteriaId": "B061FF9A-0D00-429D-9B2F-14EEA41E7A33", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.70:*:*:*:*:*:*:*", "matchCriteriaId": "D6CB0260-2A96-41A8-81A0-8E9722B22D87", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.71:*:*:*:*:*:*:*", "matchCriteriaId": "AE037065-9E33-4A5A-8188-1F086D7BE394", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.72:*:*:*:*:*:*:*", "matchCriteriaId": "70200031-5902-416D-A140-DC2CDFDAF683", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.73:*:*:*:*:*:*:*", "matchCriteriaId": "575C5F15-2C16-4B39-A718-1641DDD88F84", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.74:*:*:*:*:*:*:*", "matchCriteriaId": "9E7BFD7E-9B3F-4D63-BEBC-16F22DA6F8E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.75:*:*:*:*:*:*:*", "matchCriteriaId": "42631437-772B-45E0-A1F3-5D9E2FC77D19", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.76:*:*:*:*:*:*:*", "matchCriteriaId": "CA9E62EF-E21F-421F-9A57-54A551CEC441", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.77:*:*:*:*:*:*:*", "matchCriteriaId": "871E046E-013A-4E10-9457-4D1F407519EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.78:*:*:*:*:*:*:*", "matchCriteriaId": "B5E4B06F-AD55-4D61-B966-B38B854C0A75", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.79:*:*:*:*:*:*:*", "matchCriteriaId": "19817731-42C2-4745-88F2-D27258FC7DB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.80:*:*:*:*:*:*:*", "matchCriteriaId": "77479EEE-F81B-4653-8FAD-0AFBA3C71B09", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.81:*:*:*:*:*:*:*", "matchCriteriaId": "0208619E-9179-46D9-8E47-6CB5B4046DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.82:*:*:*:*:*:*:*", "matchCriteriaId": "6FBAE2A2-B7CB-45F6-A84C-5B9B742A0B56", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.83:*:*:*:*:*:*:*", "matchCriteriaId": "5CC16904-03FC-42B2-89F0-CA0D59A5FB91", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.84:*:*:*:*:*:*:*", "matchCriteriaId": "4E3980D1-54F1-4C2F-B140-B2F18D8958A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.85:*:*:*:*:*:*:*", "matchCriteriaId": "0C845718-520A-42CB-9BA7-00723694A01F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.86:*:*:*:*:*:*:*", "matchCriteriaId": "FAB7BF51-DD1A-41E1-B5E5-02A6BADC30DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.87:*:*:*:*:*:*:*", "matchCriteriaId": "431DA557-0977-43C2-8DEF-127B1BAA9F46", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.88:*:*:*:*:*:*:*", "matchCriteriaId": "733C0A5D-3A0A-4449-9DE0-BD06D4942799", "vulnerable": true }, { "criteria": "cpe:2.3:a:ntp:ntp:4.3.89:*:*:*:*:*:*:*", "matchCriteriaId": "C9E5DAD5-465A-4A53-856A-1F674723EB00", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero." }, { "lang": "es", "value": "NTP en versiones anteriores a 4.2.8p6 y 4.3.x en versiones anteriores a 4.3.90 permite a atacantes remotos eludir la validaci\u00f3n de marca horaria de origen a trav\u00e9s de un paquete con una marca horaria de origen puesta a cero." } ], "id": "CVE-2015-8138", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-01-30T21:59:00.723", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176434.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0063.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3629" }, { "source": "cve@mitre.org", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/81811" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034782" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3096-1" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://bto.bluecoat.com/security-advisory/sa113" }, { "source": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "source": "cve@mitre.org", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf" }, { "source": "cve@mitre.org", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03750en_us" }, { "source": "cve@mitre.org", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03766en_us" }, { "source": "cve@mitre.org", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201607-15" }, { "source": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "source": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20171031-0001/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161123-ntpd" }, { "source": "cve@mitre.org", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11" }, { "source": "cve@mitre.org", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/718152" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176434.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0063.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3629" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/81811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034782" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3096-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://bto.bluecoat.com/security-advisory/sa113" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03750en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03766en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201607-15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20171031-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161123-ntpd" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/718152" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-5mf2-6mvq-v64v
Vulnerability from github
NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.
{ "affected": [], "aliases": [ "CVE-2015-8138" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-01-30T21:59:00Z", "severity": "MODERATE" }, "details": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.", "id": "GHSA-5mf2-6mvq-v64v", "modified": "2025-04-20T03:32:03Z", "published": "2022-05-13T01:05:09Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8138" }, { "type": "WEB", "url": "https://bto.bluecoat.com/security-advisory/sa113" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "type": "WEB", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03750en_us" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03766en_us" }, { "type": "WEB", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201607-15" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20171004-0002" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20171031-0001" }, { "type": "WEB", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161123-ntpd" }, { "type": "WEB", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11" }, { "type": "WEB", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19" }, { "type": "WEB", "url": "https://www.kb.cert.org/vuls/id/718152" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176434.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-0063.html" }, { "type": "WEB", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "type": "WEB", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd" }, { "type": "WEB", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd" }, { "type": "WEB", "url": "http://www.debian.org/security/2016/dsa-3629" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/81811" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1034782" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3096-1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "type": "CVSS_V3" } ] }
gsd-2015-8138
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2015-8138", "description": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.", "id": "GSD-2015-8138", "references": [ "https://www.suse.com/security/cve/CVE-2015-8138.html", "https://www.debian.org/security/2016/dsa-3629", "https://access.redhat.com/errata/RHSA-2016:0063", "https://ubuntu.com/security/CVE-2015-8138", "https://advisories.mageia.org/CVE-2015-8138.html", "https://alas.aws.amazon.com/cve/html/CVE-2015-8138.html", "https://linux.oracle.com/cve/CVE-2015-8138.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-8138" ], "details": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.", "id": "GSD-2015-8138", "modified": "2023-12-13T01:20:03.857765Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8138", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd" }, { "name": "USN-3096-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3096-1" }, { "name": "SUSE-SU-2016:1177", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" }, { "name": "DSA-3629", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3629" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03766en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03766en_us" }, { "name": "SUSE-SU-2016:1912", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" }, { "name": "1034782", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034782" }, { "name": "openSUSE-SU-2016:1292", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" }, { "name": "VU#718152", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/718152" }, { "name": "SUSE-SU-2016:1247", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" }, { "name": "RHSA-2016:0063", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0063.html" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03750en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03750en_us" }, { "name": "FEDORA-2016-8bb1932088", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176434.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "https://security.netapp.com/advisory/ntap-20171004-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "name": "https://security.netapp.com/advisory/ntap-20171031-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20171031-0001/" }, { "name": "SUSE-SU-2016:1311", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" }, { "name": "20160428 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: April 2016", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd" }, { "name": "20161123 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: November 2016", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161123-ntpd" }, { "name": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "refsource": "CONFIRM", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "name": "FEDORA-2016-34bc10a2c8", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.html" }, { "name": "SUSE-SU-2016:2094", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" }, { "name": "SUSE-SU-2016:1175", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" }, { "name": "81811", "refsource": "BID", "url": "http://www.securityfocus.com/bid/81811" }, { "name": "FreeBSD-SA-16:09", "refsource": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc" }, { "name": "https://bto.bluecoat.com/security-advisory/sa113", "refsource": "CONFIRM", "url": "https://bto.bluecoat.com/security-advisory/sa113" }, { "name": "openSUSE-SU-2016:1423", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" }, { "name": "GLSA-201607-15", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201607-15" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11", "refsource": "MISC", "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.38:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.39:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.45:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.46:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.53:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.60:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.61:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.68:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.69:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.75:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.76:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.77:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.83:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.84:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.43:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.44:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.59:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.66:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.67:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.73:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.74:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.81:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.82:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.89:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:*:p5:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "4.2.8", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.42:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.49:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.57:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.58:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.64:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.65:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.71:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.72:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.80:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.87:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.88:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.47:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.48:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.54:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.55:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.56:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.62:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.63:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.70:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.78:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.79:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.85:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.3.86:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8138" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "VU#718152", "refsource": "CERT-VN", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/718152" }, { "name": "20161123 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: November 2016", "refsource": "CISCO", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161123-ntpd" }, { "name": "GLSA-201607-15", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201607-15" }, { "name": "https://bto.bluecoat.com/security-advisory/sa113", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://bto.bluecoat.com/security-advisory/sa113" }, { "name": "USN-3096-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3096-1" }, { "name": "1034782", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034782" }, { "name": "81811", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/81811" }, { "name": "DSA-3629", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3629" }, { "name": "20160428 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: April 2016", "refsource": "CISCO", "tags": [ "Third Party Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160428-ntpd" }, { "name": "20160120 Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products - January 2016", "refsource": "CISCO", "tags": [ "Third Party Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160127-ntpd" }, { "name": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security" }, { "name": "RHSA-2016:0063", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0063.html" }, { "name": "openSUSE-SU-2016:1423", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00114.html" }, { "name": "SUSE-SU-2016:2094", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00042.html" }, { "name": "SUSE-SU-2016:1912", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00026.html" }, { "name": "SUSE-SU-2016:1311", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00048.html" }, { "name": "openSUSE-SU-2016:1292", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00038.html" }, { "name": "SUSE-SU-2016:1247", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00020.html" }, { "name": "SUSE-SU-2016:1177", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00060.html" }, { "name": "SUSE-SU-2016:1175", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00059.html" }, { "name": "FEDORA-2016-8bb1932088", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176434.html" }, { "name": "FEDORA-2016-34bc10a2c8", "refsource": "FEDORA", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177507.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03750en_us", "refsource": "CONFIRM", "tags": [], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03750en_us" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03766en_us", "refsource": "CONFIRM", "tags": [], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03766en_us" }, { "name": "https://security.netapp.com/advisory/ntap-20171031-0001/", "refsource": "CONFIRM", "tags": [], "url": "https://security.netapp.com/advisory/ntap-20171031-0001/" }, { "name": "https://security.netapp.com/advisory/ntap-20171004-0002/", "refsource": "CONFIRM", "tags": [], "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "name": "FreeBSD-SA-16:09", "refsource": "FREEBSD", "tags": [], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-16:09.ntp.asc" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf", "refsource": "CONFIRM", "tags": [], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-497656.pdf" }, { "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11", "refsource": "MISC", "tags": [], "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-11" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf", "refsource": "CONFIRM", "tags": [], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-211752.pdf" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19", "refsource": "MISC", "tags": [], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1332-security-advisory-19" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": true, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4 } }, "lastModifiedDate": "2021-11-17T22:15Z", "publishedDate": "2017-01-30T21:59Z" } } }
cnvd-2016-00791
Vulnerability from cnvd
用户可参考如下厂商提供的安全补丁以修复该漏洞: http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit
Name | Ntp Ntp |
---|
{ "bids": { "bid": { "bidNumber": "81811" } }, "cves": { "cve": { "cveNumber": "CVE-2015-8138" } }, "description": "NTP\u662f\u4e00\u79cd\u4ee5\u6570\u636e\u5305\u4ea4\u6362\u628a\u4e24\u53f0\u7535\u8111\u7684\u65f6\u949f\u540c\u6b65\u5316\u7684\u7f51\u7edc\u534f\u8bae\u3002\r\n\r\nNTP\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u672c\u5730\u653b\u51fb\u8005\u53ef\u53d1\u9001\u5e26\u6709\u503c\u4e3a\u96f6\u7684\u65f6\u95f4\u6233\u7684\u6570\u636e\u5305\u5b9e\u65bd\u4e2d\u95f4\u4eba\u653b\u51fb\uff0c\u7ed5\u8fc7\u6e90\u65f6\u95f4\u6233\u9650\u5236\u3002", "discovererName": "Matthew Van Gundy and Jonathan Gardner of Cisco ASIG.", "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttp://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2016-00791", "openTime": "2016-02-03", "patchDescription": "NTP\u662f\u4e00\u79cd\u4ee5\u6570\u636e\u5305\u4ea4\u6362\u628a\u4e24\u53f0\u7535\u8111\u7684\u65f6\u949f\u540c\u6b65\u5316\u7684\u7f51\u7edc\u534f\u8bae\u3002\r\n\r\nNTP\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u672c\u5730\u653b\u51fb\u8005\u53ef\u53d1\u9001\u5e26\u6709\u503c\u4e3a\u96f6\u7684\u65f6\u95f4\u6233\u7684\u6570\u636e\u5305\u5b9e\u65bd\u4e2d\u95f4\u4eba\u653b\u51fb\uff0c\u7ed5\u8fc7\u6e90\u65f6\u95f4\u6233\u9650\u5236\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "NTP\u65f6\u95f4\u6233\u7ed5\u8fc7\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "Ntp Ntp" }, "referenceLink": "http://support.ntp.org/bin/view/Main/SecurityNotice#January_2016_NTP_4_2_8p6_Securit", "serverity": "\u4e2d", "submitTime": "2016-01-30", "title": "NTP\u65f6\u95f4\u6233\u7ed5\u8fc7\u6f0f\u6d1e" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.