Action not permitted
Modal body text goes here.
CVE-2015-7704
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:58:59.543Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271070" }, { "name": "RHSA-2015:1930", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1930.html" }, { "name": "77280", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/77280" }, { "name": "VU#718152", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/718152" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.ntp.org/show_bug.cgi?id=2901" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX220112" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "name": "1033951", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1033951" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_4_2_8p4_Securit" }, { "name": "DSA-3388", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3388" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.cs.bu.edu/~goldbe/NTPattack.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://eprint.iacr.org/2015/1020.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05270839" }, { "name": "RHSA-2015:2520", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2520.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug2901" }, { "name": "GLSA-201607-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201607-15" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20171004-0001/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10284" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-10-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted \"KOD\" messages." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-05T16:55:25", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271070" }, { "name": "RHSA-2015:1930", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1930.html" }, { "name": "77280", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/77280" }, { "name": "VU#718152", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/718152" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.ntp.org/show_bug.cgi?id=2901" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX220112" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "name": "1033951", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1033951" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_4_2_8p4_Securit" }, { "name": "DSA-3388", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3388" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.cs.bu.edu/~goldbe/NTPattack.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://eprint.iacr.org/2015/1020.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05270839" }, { "name": "RHSA-2015:2520", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2520.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug2901" }, { "name": "GLSA-201607-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201607-15" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20171004-0001/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10284" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-7704", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted \"KOD\" messages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1271070", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271070" }, { "name": "RHSA-2015:1930", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1930.html" }, { "name": "77280", "refsource": "BID", "url": "http://www.securityfocus.com/bid/77280" }, { "name": "VU#718152", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/718152" }, { "name": "http://bugs.ntp.org/show_bug.cgi?id=2901", "refsource": "CONFIRM", "url": "http://bugs.ntp.org/show_bug.cgi?id=2901" }, { "name": "https://support.citrix.com/article/CTX220112", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX220112" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "https://security.netapp.com/advisory/ntap-20171004-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "name": "1033951", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1033951" }, { "name": "http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_4_2_8p4_Securit", "refsource": "CONFIRM", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_4_2_8p4_Securit" }, { "name": "DSA-3388", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3388" }, { "name": "https://www.cs.bu.edu/~goldbe/NTPattack.html", "refsource": "MISC", "url": "https://www.cs.bu.edu/~goldbe/NTPattack.html" }, { "name": "https://eprint.iacr.org/2015/1020.pdf", "refsource": "MISC", "url": "https://eprint.iacr.org/2015/1020.pdf" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05270839", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05270839" }, { "name": "RHSA-2015:2520", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-2520.html" }, { "name": "http://support.ntp.org/bin/view/Main/NtpBug2901", "refsource": "CONFIRM", "url": "http://support.ntp.org/bin/view/Main/NtpBug2901" }, { "name": "GLSA-201607-15", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201607-15" }, { "name": "https://security.netapp.com/advisory/ntap-20171004-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20171004-0001/" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10284", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10284" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-7704", "datePublished": "2017-08-07T20:00:00", "dateReserved": "2015-10-04T00:00:00", "dateUpdated": "2024-08-06T07:58:59.543Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-7704\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-08-07T20:29:00.683\",\"lastModified\":\"2021-11-17T22:15:44.397\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted \\\"KOD\\\" messages.\"},{\"lang\":\"es\",\"value\":\"El cliente ntpd en NTP 4.x en versiones anteriores a 4.2.8p4, y 4.3.x en versiones anteriores a 4.3.77 permite que atacantes remotos provoquen una denegaci\u00f3n de servicio empleando una serie de mensajes \\\"KOD\\\" manipulados.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.2.0\",\"versionEndExcluding\":\"4.2.8\",\"matchCriteriaId\":\"C240BAAB-8C12-4501-9DC6-FB877304E908\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.3.0\",\"versionEndExcluding\":\"4.3.77\",\"matchCriteriaId\":\"79494F07-6081-497D-8A2D-B05486599EAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEA51D83-5841-4335-AF07-7A43C118CAAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C855BBD2-2B38-4EFF-9DBE-CA61CCACD0DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"49ADE0C3-F75C-4EC0-8805-56013F0EB92C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8FF625A-EFA3-43D1-8698-4A37AE31A07C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3B99BBD-97FE-4615-905A-A614592226F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7A9AD3A-F030-4331-B52A-518BD963AB8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"C293B8BE-6691-4944-BCD6-25EB98CABC73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEA650F8-2576-494A-A861-61572CA319D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ED21EE8-7CBF-4BC5-BFC3-185D41296238\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C76A0B44-13DE-4173-8D05-DA54F6A71759\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1450241C-2F6D-4122-B33C-D78D065BA403\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"721AFD22-91D3-488E-A5E6-DD84C86E412B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D6ADDB1-2E96-4FF6-AE95-4B06654D38B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"41E44E9F-6383-4E12-AEDC-B653FEA77A48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"466D9A37-2658-4695-9429-0C6BF4A631C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"99774181-5F12-446C-AC2C-DB1C52295EED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"4427EE6D-3F79-4FF5-B3EC-EE6BD01562CE\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"212E1878-1B9A-4CB4-A1CE-EAD60B867161\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*\",\"matchCriteriaId\":\"95B173E0-1475-4F8D-A982-86F36BE3DD4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FED6CAE-D97F-49E0-9D00-1642A3A427B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:data_ontap:-:*:*:*:*:7-mode:*:*\",\"matchCriteriaId\":\"392A1364-2739-450D-9E19-DFF93081C2C6\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16E6D998-B41D-4B49-9E00-8336D2E40A4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98381E61-F082-4302-B51F-5648884F998B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99A687E-EAE6-417E-A88E-D0082BC194CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B353CE99-D57C-465B-AAB0-73EF581127D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7431ABC1-9252-419E-8CC1-311B41360078\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45010D45-2FF2-4B04-B115-6B6FE606D598\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C18E3368-8980-45D2-AD3F-5BF385ABA693\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C81647C-9A53-481D-A54C-36770A093F90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E8CD4EF-DC90-40BB-A721-6EC087507906\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8442C20-41F9-47FD-9A12-E724D3A31FD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF77CDCF-B9C9-427D-B2BF-36650FB2148C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21690BAC-2129-4A33-9B48-1F3BF30072A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"835AE071-CEAE-49E5-8F0C-E5F50FB85EFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13E02156-E748-4820-B76F-7074793837E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76AA310-FEC7-497F-AF04-C3EC1E76C4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17F256A9-D3B9-4C72-B013-4EFD878BFEA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:enterprise_security_manager:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.4.0\",\"matchCriteriaId\":\"7E05BFFB-218A-4B91-880F-F7F321485153\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:enterprise_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0\",\"versionEndExcluding\":\"11.2.0\",\"matchCriteriaId\":\"5995933D-6186-46E1-9835-1760CEA6389D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FCF191B-971A-4945-AB14-08091689BE2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:xenserver:6.2.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"F31DB577-72CD-49CC-8AF5-23098503939E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:xenserver:6.5:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CC06F6C-6C15-444F-B159-235D347E5929\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"405F950F-0772-41A3-8B72-B67151CC1376\"}]}]}],\"references\":[{\"url\":\"http://bugs.ntp.org/show_bug.cgi?id=2901\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1930.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2520.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.ntp.org/bin/view/Main/NtpBug2901\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_4_2_8p4_Securit\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3388\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/77280\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1033951\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1271070\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://eprint.iacr.org/2015/1020.pdf\",\"source\":\"cve@mitre.org\",\"tags\":[\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05270839\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10284\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201607-15\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20171004-0001/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20171004-0002/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.citrix.com/article/CTX220112\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.cs.bu.edu/~goldbe/NTPattack.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/718152\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}" } }
rhsa-2015_2520
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated ntp packages that fix one security issue are now available for Red\nHat Enterprise Linux 6.5 and 6.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "The Network Time Protocol (NTP) is used to synchronize a computer\u0027s time\nwith a referenced time source.\n\nIt was discovered that ntpd as a client did not correctly check timestamps\nin Kiss-of-Death packets. A remote attacker could use this flaw to send a\ncrafted Kiss-of-Death packet to an ntpd client that would increase the\nclient\u0027s polling interval value, and effectively disable synchronization\nwith the server. (CVE-2015-7704)\n\nRed Hat would like to thank Aanchal Malhotra, Isaac E. Cohen, and Sharon\nGoldberg of Boston University for reporting this issue.\n\nAll ntp users are advised to upgrade to these updated packages, which\ncontain a backported patch to resolve this issue. After installing the\nupdate, the ntpd daemon will restart automatically.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2520", "url": "https://access.redhat.com/errata/RHSA-2015:2520" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1271070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271070" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2520.json" } ], "title": "Red Hat Security Advisory: ntp security update", "tracking": { "current_release_date": "2024-11-22T09:32:50+00:00", "generator": { "date": "2024-11-22T09:32:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2520", "initial_release_date": "2015-11-26T08:46:24+00:00", "revision_history": [ { "date": "2015-11-26T08:46:24+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-11-26T08:46:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:32:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.5)", "product": { "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.5)", "product_id": "6ComputeNode-6.5.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.5::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.5)", "product": { "name": "Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.5)", "product_id": "6ComputeNode-optional-6.5.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.5::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 6.5)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 6.5)", "product_id": "6Server-6.5.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.5)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.5)", "product_id": "6Server-optional-6.5.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "ntp-0:4.2.6p5-2.el6_5.1.src", "product": { "name": "ntp-0:4.2.6p5-2.el6_5.1.src", "product_id": "ntp-0:4.2.6p5-2.el6_5.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-2.el6_5.1?arch=src" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-3.el6_6.1.src", "product": { "name": "ntp-0:4.2.6p5-3.el6_6.1.src", "product_id": "ntp-0:4.2.6p5-3.el6_6.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-3.el6_6.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-2.el6_5.1.s390x", "product": { "name": "ntp-perl-0:4.2.6p5-2.el6_5.1.s390x", "product_id": "ntp-perl-0:4.2.6p5-2.el6_5.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-2.el6_5.1?arch=s390x" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.s390x", "product": { "name": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.s390x", "product_id": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-2.el6_5.1?arch=s390x" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-2.el6_5.1.s390x", "product": { "name": "ntpdate-0:4.2.6p5-2.el6_5.1.s390x", "product_id": "ntpdate-0:4.2.6p5-2.el6_5.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-2.el6_5.1?arch=s390x" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-2.el6_5.1.s390x", "product": { "name": "ntp-0:4.2.6p5-2.el6_5.1.s390x", "product_id": "ntp-0:4.2.6p5-2.el6_5.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-2.el6_5.1?arch=s390x" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.s390x", "product": { "name": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.s390x", "product_id": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-3.el6_6.1?arch=s390x" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-3.el6_6.1.s390x", "product": { "name": "ntp-perl-0:4.2.6p5-3.el6_6.1.s390x", "product_id": "ntp-perl-0:4.2.6p5-3.el6_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-3.el6_6.1?arch=s390x" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-3.el6_6.1.s390x", "product": { "name": "ntp-0:4.2.6p5-3.el6_6.1.s390x", "product_id": "ntp-0:4.2.6p5-3.el6_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-3.el6_6.1?arch=s390x" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-3.el6_6.1.s390x", "product": { "name": "ntpdate-0:4.2.6p5-3.el6_6.1.s390x", "product_id": "ntpdate-0:4.2.6p5-3.el6_6.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-3.el6_6.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.ppc64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.ppc64", "product_id": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-2.el6_5.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-2.el6_5.1.ppc64", "product": { "name": "ntp-perl-0:4.2.6p5-2.el6_5.1.ppc64", "product_id": "ntp-perl-0:4.2.6p5-2.el6_5.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-2.el6_5.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-2.el6_5.1.ppc64", "product": { "name": "ntpdate-0:4.2.6p5-2.el6_5.1.ppc64", "product_id": "ntpdate-0:4.2.6p5-2.el6_5.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-2.el6_5.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-2.el6_5.1.ppc64", "product": { "name": "ntp-0:4.2.6p5-2.el6_5.1.ppc64", "product_id": "ntp-0:4.2.6p5-2.el6_5.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-2.el6_5.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-3.el6_6.1.ppc64", "product": { "name": "ntp-perl-0:4.2.6p5-3.el6_6.1.ppc64", "product_id": "ntp-perl-0:4.2.6p5-3.el6_6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-3.el6_6.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.ppc64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.ppc64", "product_id": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-3.el6_6.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-3.el6_6.1.ppc64", "product": { "name": "ntp-0:4.2.6p5-3.el6_6.1.ppc64", "product_id": "ntp-0:4.2.6p5-3.el6_6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-3.el6_6.1?arch=ppc64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-3.el6_6.1.ppc64", "product": { "name": "ntpdate-0:4.2.6p5-3.el6_6.1.ppc64", "product_id": "ntpdate-0:4.2.6p5-3.el6_6.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-3.el6_6.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "ntp-doc-0:4.2.6p5-2.el6_5.1.noarch", "product": { "name": "ntp-doc-0:4.2.6p5-2.el6_5.1.noarch", "product_id": "ntp-doc-0:4.2.6p5-2.el6_5.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-doc@4.2.6p5-2.el6_5.1?arch=noarch" } } }, { "category": "product_version", "name": "ntp-doc-0:4.2.6p5-3.el6_6.1.noarch", "product": { "name": "ntp-doc-0:4.2.6p5-3.el6_6.1.noarch", "product_id": "ntp-doc-0:4.2.6p5-3.el6_6.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-doc@4.2.6p5-3.el6_6.1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-2.el6_5.1.i686", "product": { "name": "ntp-perl-0:4.2.6p5-2.el6_5.1.i686", "product_id": "ntp-perl-0:4.2.6p5-2.el6_5.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-2.el6_5.1?arch=i686" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.i686", "product": { "name": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.i686", "product_id": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-2.el6_5.1?arch=i686" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-2.el6_5.1.i686", "product": { "name": "ntp-0:4.2.6p5-2.el6_5.1.i686", "product_id": "ntp-0:4.2.6p5-2.el6_5.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-2.el6_5.1?arch=i686" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-2.el6_5.1.i686", "product": { "name": "ntpdate-0:4.2.6p5-2.el6_5.1.i686", "product_id": "ntpdate-0:4.2.6p5-2.el6_5.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-2.el6_5.1?arch=i686" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-3.el6_6.1.i686", "product": { "name": "ntp-perl-0:4.2.6p5-3.el6_6.1.i686", "product_id": "ntp-perl-0:4.2.6p5-3.el6_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-3.el6_6.1?arch=i686" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.i686", "product": { "name": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.i686", "product_id": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-3.el6_6.1?arch=i686" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-3.el6_6.1.i686", "product": { "name": "ntpdate-0:4.2.6p5-3.el6_6.1.i686", "product_id": "ntpdate-0:4.2.6p5-3.el6_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-3.el6_6.1?arch=i686" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-3.el6_6.1.i686", "product": { "name": "ntp-0:4.2.6p5-3.el6_6.1.i686", "product_id": "ntp-0:4.2.6p5-3.el6_6.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-3.el6_6.1?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-2.el6_5.1.x86_64", "product": { "name": "ntp-perl-0:4.2.6p5-2.el6_5.1.x86_64", "product_id": "ntp-perl-0:4.2.6p5-2.el6_5.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-2.el6_5.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.x86_64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.x86_64", "product_id": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-2.el6_5.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-2.el6_5.1.x86_64", "product": { "name": "ntp-0:4.2.6p5-2.el6_5.1.x86_64", "product_id": "ntp-0:4.2.6p5-2.el6_5.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-2.el6_5.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-2.el6_5.1.x86_64", "product": { "name": "ntpdate-0:4.2.6p5-2.el6_5.1.x86_64", "product_id": "ntpdate-0:4.2.6p5-2.el6_5.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-2.el6_5.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-3.el6_6.1.x86_64", "product": { "name": "ntp-perl-0:4.2.6p5-3.el6_6.1.x86_64", "product_id": "ntp-perl-0:4.2.6p5-3.el6_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-3.el6_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.x86_64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.x86_64", "product_id": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-3.el6_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-3.el6_6.1.x86_64", "product": { "name": "ntp-0:4.2.6p5-3.el6_6.1.x86_64", "product_id": "ntp-0:4.2.6p5-3.el6_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-3.el6_6.1?arch=x86_64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-3.el6_6.1.x86_64", "product": { "name": "ntpdate-0:4.2.6p5-3.el6_6.1.x86_64", "product_id": "ntpdate-0:4.2.6p5-3.el6_6.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-3.el6_6.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-2.el6_5.1.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.5)", "product_id": "6ComputeNode-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.i686" }, "product_reference": "ntp-0:4.2.6p5-2.el6_5.1.i686", "relates_to_product_reference": "6ComputeNode-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-2.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.5)", "product_id": "6ComputeNode-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-2.el6_5.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-2.el6_5.1.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.5)", "product_id": "6ComputeNode-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-2.el6_5.1.s390x", "relates_to_product_reference": "6ComputeNode-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-2.el6_5.1.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.5)", "product_id": "6ComputeNode-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.src" }, "product_reference": "ntp-0:4.2.6p5-2.el6_5.1.src", "relates_to_product_reference": "6ComputeNode-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-2.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.5)", "product_id": "6ComputeNode-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-2.el6_5.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.5)", "product_id": "6ComputeNode-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.i686", "relates_to_product_reference": "6ComputeNode-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.5)", "product_id": "6ComputeNode-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.5)", "product_id": "6ComputeNode-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.s390x", "relates_to_product_reference": "6ComputeNode-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.5)", "product_id": "6ComputeNode-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-2.el6_5.1.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.5)", "product_id": "6ComputeNode-6.5.EUS:ntp-doc-0:4.2.6p5-2.el6_5.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-2.el6_5.1.noarch", "relates_to_product_reference": "6ComputeNode-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-2.el6_5.1.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.5)", "product_id": "6ComputeNode-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-2.el6_5.1.i686", "relates_to_product_reference": "6ComputeNode-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-2.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.5)", "product_id": "6ComputeNode-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-2.el6_5.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-2.el6_5.1.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.5)", "product_id": "6ComputeNode-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-2.el6_5.1.s390x", "relates_to_product_reference": "6ComputeNode-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-2.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.5)", "product_id": "6ComputeNode-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-2.el6_5.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-2.el6_5.1.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.5)", "product_id": "6ComputeNode-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-2.el6_5.1.i686", "relates_to_product_reference": "6ComputeNode-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-2.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.5)", "product_id": "6ComputeNode-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-2.el6_5.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-2.el6_5.1.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.5)", "product_id": "6ComputeNode-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-2.el6_5.1.s390x", "relates_to_product_reference": "6ComputeNode-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-2.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.5)", "product_id": "6ComputeNode-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-2.el6_5.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-3.el6_6.1.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-3.el6_6.1.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-3.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-3.el6_6.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-3.el6_6.1.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-3.el6_6.1.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-3.el6_6.1.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.src" }, "product_reference": "ntp-0:4.2.6p5-3.el6_6.1.src", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-3.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-3.el6_6.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-3.el6_6.1.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:ntp-doc-0:4.2.6p5-3.el6_6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-3.el6_6.1.noarch", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-3.el6_6.1.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-3.el6_6.1.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-3.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-3.el6_6.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-3.el6_6.1.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-3.el6_6.1.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-3.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-3.el6_6.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-3.el6_6.1.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-3.el6_6.1.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-3.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-3.el6_6.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-3.el6_6.1.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-3.el6_6.1.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-3.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-3.el6_6.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-2.el6_5.1.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.5)", "product_id": "6ComputeNode-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.i686" }, "product_reference": "ntp-0:4.2.6p5-2.el6_5.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-2.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.5)", "product_id": "6ComputeNode-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-2.el6_5.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-2.el6_5.1.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.5)", "product_id": "6ComputeNode-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-2.el6_5.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-2.el6_5.1.src as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.5)", "product_id": "6ComputeNode-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.src" }, "product_reference": "ntp-0:4.2.6p5-2.el6_5.1.src", "relates_to_product_reference": "6ComputeNode-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-2.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.5)", "product_id": "6ComputeNode-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-2.el6_5.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.5)", "product_id": "6ComputeNode-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.5)", "product_id": "6ComputeNode-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.5)", "product_id": "6ComputeNode-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.5)", "product_id": "6ComputeNode-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-2.el6_5.1.noarch as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.5)", "product_id": "6ComputeNode-optional-6.5.EUS:ntp-doc-0:4.2.6p5-2.el6_5.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-2.el6_5.1.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-2.el6_5.1.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.5)", "product_id": "6ComputeNode-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-2.el6_5.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-2.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.5)", "product_id": "6ComputeNode-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-2.el6_5.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-2.el6_5.1.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.5)", "product_id": "6ComputeNode-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-2.el6_5.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-2.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.5)", "product_id": "6ComputeNode-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-2.el6_5.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-2.el6_5.1.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.5)", "product_id": "6ComputeNode-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-2.el6_5.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-2.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.5)", "product_id": "6ComputeNode-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-2.el6_5.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-2.el6_5.1.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.5)", "product_id": "6ComputeNode-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-2.el6_5.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-2.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.5)", "product_id": "6ComputeNode-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-2.el6_5.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-3.el6_6.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-3.el6_6.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-3.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-3.el6_6.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-3.el6_6.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-3.el6_6.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-3.el6_6.1.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.src" }, "product_reference": "ntp-0:4.2.6p5-3.el6_6.1.src", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-3.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-3.el6_6.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-3.el6_6.1.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:ntp-doc-0:4.2.6p5-3.el6_6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-3.el6_6.1.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-3.el6_6.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-3.el6_6.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-3.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-3.el6_6.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-3.el6_6.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-3.el6_6.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-3.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-3.el6_6.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-3.el6_6.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-3.el6_6.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-3.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-3.el6_6.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-3.el6_6.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-3.el6_6.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-3.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-3.el6_6.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-2.el6_5.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.5)", "product_id": "6Server-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.i686" }, "product_reference": "ntp-0:4.2.6p5-2.el6_5.1.i686", "relates_to_product_reference": "6Server-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-2.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.5)", "product_id": "6Server-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-2.el6_5.1.ppc64", "relates_to_product_reference": "6Server-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-2.el6_5.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.5)", "product_id": "6Server-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-2.el6_5.1.s390x", "relates_to_product_reference": "6Server-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-2.el6_5.1.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.5)", "product_id": "6Server-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.src" }, "product_reference": "ntp-0:4.2.6p5-2.el6_5.1.src", "relates_to_product_reference": "6Server-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-2.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.5)", "product_id": "6Server-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-2.el6_5.1.x86_64", "relates_to_product_reference": "6Server-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.5)", "product_id": "6Server-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.i686", "relates_to_product_reference": "6Server-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.5)", "product_id": "6Server-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.ppc64", "relates_to_product_reference": "6Server-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.5)", "product_id": "6Server-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.s390x", "relates_to_product_reference": "6Server-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.5)", "product_id": "6Server-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.x86_64", "relates_to_product_reference": "6Server-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-2.el6_5.1.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.5)", "product_id": "6Server-6.5.EUS:ntp-doc-0:4.2.6p5-2.el6_5.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-2.el6_5.1.noarch", "relates_to_product_reference": "6Server-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-2.el6_5.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.5)", "product_id": "6Server-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-2.el6_5.1.i686", "relates_to_product_reference": "6Server-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-2.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.5)", "product_id": "6Server-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-2.el6_5.1.ppc64", "relates_to_product_reference": "6Server-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-2.el6_5.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.5)", "product_id": "6Server-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-2.el6_5.1.s390x", "relates_to_product_reference": "6Server-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-2.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.5)", "product_id": "6Server-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-2.el6_5.1.x86_64", "relates_to_product_reference": "6Server-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-2.el6_5.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.5)", "product_id": "6Server-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-2.el6_5.1.i686", "relates_to_product_reference": "6Server-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-2.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.5)", "product_id": "6Server-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-2.el6_5.1.ppc64", "relates_to_product_reference": "6Server-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-2.el6_5.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.5)", "product_id": "6Server-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-2.el6_5.1.s390x", "relates_to_product_reference": "6Server-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-2.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.5)", "product_id": "6Server-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-2.el6_5.1.x86_64", "relates_to_product_reference": "6Server-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-3.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-3.el6_6.1.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-3.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-3.el6_6.1.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-3.el6_6.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-3.el6_6.1.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-3.el6_6.1.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.src" }, "product_reference": "ntp-0:4.2.6p5-3.el6_6.1.src", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-3.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-3.el6_6.1.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-3.el6_6.1.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:ntp-doc-0:4.2.6p5-3.el6_6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-3.el6_6.1.noarch", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-3.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-3.el6_6.1.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-3.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-3.el6_6.1.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-3.el6_6.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-3.el6_6.1.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-3.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-3.el6_6.1.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-3.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-3.el6_6.1.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-3.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-3.el6_6.1.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-3.el6_6.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-3.el6_6.1.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-3.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-3.el6_6.1.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-2.el6_5.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.5)", "product_id": "6Server-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.i686" }, "product_reference": "ntp-0:4.2.6p5-2.el6_5.1.i686", "relates_to_product_reference": "6Server-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-2.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.5)", "product_id": "6Server-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-2.el6_5.1.ppc64", "relates_to_product_reference": "6Server-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-2.el6_5.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.5)", "product_id": "6Server-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-2.el6_5.1.s390x", "relates_to_product_reference": "6Server-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-2.el6_5.1.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.5)", "product_id": "6Server-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.src" }, "product_reference": "ntp-0:4.2.6p5-2.el6_5.1.src", "relates_to_product_reference": "6Server-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-2.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.5)", "product_id": "6Server-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-2.el6_5.1.x86_64", "relates_to_product_reference": "6Server-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.5)", "product_id": "6Server-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.i686", "relates_to_product_reference": "6Server-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.5)", "product_id": "6Server-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.ppc64", "relates_to_product_reference": "6Server-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.5)", "product_id": "6Server-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.s390x", "relates_to_product_reference": "6Server-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.5)", "product_id": "6Server-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-2.el6_5.1.x86_64", "relates_to_product_reference": "6Server-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-2.el6_5.1.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.5)", "product_id": "6Server-optional-6.5.EUS:ntp-doc-0:4.2.6p5-2.el6_5.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-2.el6_5.1.noarch", "relates_to_product_reference": "6Server-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-2.el6_5.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.5)", "product_id": "6Server-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-2.el6_5.1.i686", "relates_to_product_reference": "6Server-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-2.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.5)", "product_id": "6Server-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-2.el6_5.1.ppc64", "relates_to_product_reference": "6Server-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-2.el6_5.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.5)", "product_id": "6Server-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-2.el6_5.1.s390x", "relates_to_product_reference": "6Server-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-2.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.5)", "product_id": "6Server-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-2.el6_5.1.x86_64", "relates_to_product_reference": "6Server-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-2.el6_5.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.5)", "product_id": "6Server-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-2.el6_5.1.i686", "relates_to_product_reference": "6Server-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-2.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.5)", "product_id": "6Server-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-2.el6_5.1.ppc64", "relates_to_product_reference": "6Server-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-2.el6_5.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.5)", "product_id": "6Server-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-2.el6_5.1.s390x", "relates_to_product_reference": "6Server-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-2.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.5)", "product_id": "6Server-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-2.el6_5.1.x86_64", "relates_to_product_reference": "6Server-optional-6.5.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-3.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.i686" }, "product_reference": "ntp-0:4.2.6p5-3.el6_6.1.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-3.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.ppc64" }, "product_reference": "ntp-0:4.2.6p5-3.el6_6.1.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-3.el6_6.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.s390x" }, "product_reference": "ntp-0:4.2.6p5-3.el6_6.1.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-3.el6_6.1.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.src" }, "product_reference": "ntp-0:4.2.6p5-3.el6_6.1.src", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-3.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.x86_64" }, "product_reference": "ntp-0:4.2.6p5-3.el6_6.1.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-3.el6_6.1.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-3.el6_6.1.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:ntp-doc-0:4.2.6p5-3.el6_6.1.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-3.el6_6.1.noarch", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-3.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-3.el6_6.1.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-3.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-3.el6_6.1.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-3.el6_6.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-3.el6_6.1.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-3.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-3.el6_6.1.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-3.el6_6.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.i686" }, "product_reference": "ntpdate-0:4.2.6p5-3.el6_6.1.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-3.el6_6.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-3.el6_6.1.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-3.el6_6.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-3.el6_6.1.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-3.el6_6.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-3.el6_6.1.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Aanchal Malhotra", "Isaac E. Cohen", "Sharon Goldberg" ], "organization": "Boston University" } ], "cve": "CVE-2015-7704", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2015-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1271070" } ], "notes": [ { "category": "description", "text": "It was discovered that ntpd as a client did not correctly check timestamps in Kiss-of-Death packets. A remote attacker could use this flaw to send a crafted Kiss-of-Death packet to an ntpd client that would increase the client\u0027s polling interval value, and effectively disable synchronization with the server.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: disabling synchronization via crafted KoD packet", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of ntp as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.4, as they do not include support for KoD packets.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.i686", "6ComputeNode-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.ppc64", "6ComputeNode-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.s390x", "6ComputeNode-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.src", "6ComputeNode-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.x86_64", "6ComputeNode-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.i686", "6ComputeNode-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.ppc64", "6ComputeNode-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.s390x", "6ComputeNode-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.x86_64", "6ComputeNode-6.5.EUS:ntp-doc-0:4.2.6p5-2.el6_5.1.noarch", "6ComputeNode-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.i686", "6ComputeNode-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.ppc64", "6ComputeNode-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.s390x", "6ComputeNode-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.x86_64", "6ComputeNode-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.i686", "6ComputeNode-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.ppc64", "6ComputeNode-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.s390x", "6ComputeNode-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.x86_64", "6ComputeNode-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.i686", "6ComputeNode-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.ppc64", "6ComputeNode-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.s390x", "6ComputeNode-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.src", "6ComputeNode-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.x86_64", "6ComputeNode-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.i686", "6ComputeNode-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.ppc64", "6ComputeNode-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.s390x", "6ComputeNode-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.x86_64", "6ComputeNode-6.6.EUS:ntp-doc-0:4.2.6p5-3.el6_6.1.noarch", "6ComputeNode-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.i686", "6ComputeNode-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.ppc64", "6ComputeNode-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.s390x", "6ComputeNode-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.x86_64", "6ComputeNode-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.i686", "6ComputeNode-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.ppc64", "6ComputeNode-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.s390x", "6ComputeNode-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.x86_64", "6ComputeNode-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.i686", "6ComputeNode-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.ppc64", "6ComputeNode-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.s390x", "6ComputeNode-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.src", "6ComputeNode-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.x86_64", "6ComputeNode-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.i686", "6ComputeNode-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.ppc64", "6ComputeNode-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.s390x", "6ComputeNode-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.x86_64", "6ComputeNode-optional-6.5.EUS:ntp-doc-0:4.2.6p5-2.el6_5.1.noarch", "6ComputeNode-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.i686", "6ComputeNode-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.ppc64", "6ComputeNode-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.s390x", "6ComputeNode-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.x86_64", "6ComputeNode-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.i686", "6ComputeNode-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.ppc64", "6ComputeNode-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.s390x", "6ComputeNode-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.x86_64", "6ComputeNode-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.i686", "6ComputeNode-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.ppc64", "6ComputeNode-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.s390x", "6ComputeNode-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.src", "6ComputeNode-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.x86_64", "6ComputeNode-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.i686", "6ComputeNode-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.ppc64", "6ComputeNode-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.s390x", "6ComputeNode-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.x86_64", "6ComputeNode-optional-6.6.EUS:ntp-doc-0:4.2.6p5-3.el6_6.1.noarch", "6ComputeNode-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.i686", "6ComputeNode-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.ppc64", "6ComputeNode-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.s390x", "6ComputeNode-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.x86_64", "6ComputeNode-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.i686", "6ComputeNode-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.ppc64", "6ComputeNode-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.s390x", "6ComputeNode-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.x86_64", "6Server-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.i686", "6Server-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.ppc64", "6Server-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.s390x", "6Server-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.src", "6Server-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.x86_64", "6Server-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.i686", "6Server-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.ppc64", "6Server-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.s390x", "6Server-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.x86_64", "6Server-6.5.EUS:ntp-doc-0:4.2.6p5-2.el6_5.1.noarch", "6Server-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.i686", "6Server-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.ppc64", "6Server-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.s390x", "6Server-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.x86_64", "6Server-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.i686", "6Server-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.ppc64", "6Server-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.s390x", "6Server-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.x86_64", "6Server-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.i686", "6Server-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.ppc64", "6Server-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.s390x", "6Server-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.src", "6Server-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.x86_64", "6Server-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.i686", "6Server-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.ppc64", "6Server-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.s390x", "6Server-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.x86_64", "6Server-6.6.EUS:ntp-doc-0:4.2.6p5-3.el6_6.1.noarch", "6Server-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.i686", "6Server-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.ppc64", "6Server-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.s390x", "6Server-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.x86_64", "6Server-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.i686", "6Server-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.ppc64", "6Server-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.s390x", "6Server-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.x86_64", "6Server-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.i686", "6Server-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.ppc64", "6Server-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.s390x", "6Server-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.src", "6Server-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.x86_64", "6Server-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.i686", "6Server-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.ppc64", "6Server-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.s390x", "6Server-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.x86_64", "6Server-optional-6.5.EUS:ntp-doc-0:4.2.6p5-2.el6_5.1.noarch", "6Server-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.i686", "6Server-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.ppc64", "6Server-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.s390x", "6Server-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.x86_64", "6Server-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.i686", "6Server-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.ppc64", "6Server-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.s390x", "6Server-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.x86_64", "6Server-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.i686", "6Server-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.ppc64", "6Server-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.s390x", "6Server-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.src", "6Server-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.x86_64", "6Server-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.i686", "6Server-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.ppc64", "6Server-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.s390x", "6Server-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.x86_64", "6Server-optional-6.6.EUS:ntp-doc-0:4.2.6p5-3.el6_6.1.noarch", "6Server-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.i686", "6Server-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.ppc64", "6Server-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.s390x", "6Server-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.x86_64", "6Server-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.i686", "6Server-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.ppc64", "6Server-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.s390x", "6Server-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7704" }, { "category": "external", "summary": "RHBZ#1271070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271070" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7704", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7704" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7704", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7704" }, { "category": "external", "summary": "https://www.cs.bu.edu/~goldbe/NTPattack.html", "url": "https://www.cs.bu.edu/~goldbe/NTPattack.html" } ], "release_date": "2015-10-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-11-26T08:46:24+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6ComputeNode-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.i686", "6ComputeNode-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.ppc64", "6ComputeNode-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.s390x", "6ComputeNode-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.src", "6ComputeNode-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.x86_64", "6ComputeNode-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.i686", "6ComputeNode-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.ppc64", "6ComputeNode-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.s390x", "6ComputeNode-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.x86_64", "6ComputeNode-6.5.EUS:ntp-doc-0:4.2.6p5-2.el6_5.1.noarch", "6ComputeNode-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.i686", "6ComputeNode-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.ppc64", "6ComputeNode-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.s390x", "6ComputeNode-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.x86_64", "6ComputeNode-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.i686", "6ComputeNode-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.ppc64", "6ComputeNode-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.s390x", "6ComputeNode-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.x86_64", "6ComputeNode-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.i686", "6ComputeNode-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.ppc64", "6ComputeNode-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.s390x", "6ComputeNode-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.src", "6ComputeNode-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.x86_64", "6ComputeNode-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.i686", "6ComputeNode-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.ppc64", "6ComputeNode-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.s390x", "6ComputeNode-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.x86_64", "6ComputeNode-6.6.EUS:ntp-doc-0:4.2.6p5-3.el6_6.1.noarch", "6ComputeNode-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.i686", "6ComputeNode-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.ppc64", "6ComputeNode-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.s390x", "6ComputeNode-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.x86_64", "6ComputeNode-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.i686", "6ComputeNode-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.ppc64", "6ComputeNode-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.s390x", "6ComputeNode-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.x86_64", "6ComputeNode-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.i686", "6ComputeNode-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.ppc64", "6ComputeNode-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.s390x", "6ComputeNode-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.src", "6ComputeNode-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.x86_64", "6ComputeNode-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.i686", "6ComputeNode-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.ppc64", "6ComputeNode-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.s390x", "6ComputeNode-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.x86_64", "6ComputeNode-optional-6.5.EUS:ntp-doc-0:4.2.6p5-2.el6_5.1.noarch", "6ComputeNode-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.i686", "6ComputeNode-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.ppc64", "6ComputeNode-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.s390x", "6ComputeNode-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.x86_64", "6ComputeNode-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.i686", "6ComputeNode-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.ppc64", "6ComputeNode-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.s390x", "6ComputeNode-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.x86_64", "6ComputeNode-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.i686", "6ComputeNode-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.ppc64", "6ComputeNode-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.s390x", "6ComputeNode-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.src", "6ComputeNode-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.x86_64", "6ComputeNode-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.i686", "6ComputeNode-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.ppc64", "6ComputeNode-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.s390x", "6ComputeNode-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.x86_64", "6ComputeNode-optional-6.6.EUS:ntp-doc-0:4.2.6p5-3.el6_6.1.noarch", "6ComputeNode-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.i686", "6ComputeNode-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.ppc64", "6ComputeNode-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.s390x", "6ComputeNode-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.x86_64", "6ComputeNode-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.i686", "6ComputeNode-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.ppc64", "6ComputeNode-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.s390x", "6ComputeNode-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.x86_64", "6Server-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.i686", "6Server-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.ppc64", "6Server-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.s390x", "6Server-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.src", "6Server-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.x86_64", "6Server-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.i686", "6Server-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.ppc64", "6Server-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.s390x", "6Server-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.x86_64", "6Server-6.5.EUS:ntp-doc-0:4.2.6p5-2.el6_5.1.noarch", "6Server-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.i686", "6Server-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.ppc64", "6Server-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.s390x", "6Server-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.x86_64", "6Server-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.i686", "6Server-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.ppc64", "6Server-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.s390x", "6Server-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.x86_64", "6Server-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.i686", "6Server-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.ppc64", "6Server-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.s390x", "6Server-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.src", "6Server-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.x86_64", "6Server-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.i686", "6Server-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.ppc64", "6Server-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.s390x", "6Server-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.x86_64", "6Server-6.6.EUS:ntp-doc-0:4.2.6p5-3.el6_6.1.noarch", "6Server-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.i686", "6Server-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.ppc64", "6Server-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.s390x", "6Server-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.x86_64", "6Server-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.i686", "6Server-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.ppc64", "6Server-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.s390x", "6Server-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.x86_64", "6Server-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.i686", "6Server-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.ppc64", "6Server-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.s390x", "6Server-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.src", "6Server-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.x86_64", "6Server-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.i686", "6Server-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.ppc64", "6Server-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.s390x", "6Server-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.x86_64", "6Server-optional-6.5.EUS:ntp-doc-0:4.2.6p5-2.el6_5.1.noarch", "6Server-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.i686", "6Server-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.ppc64", "6Server-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.s390x", "6Server-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.x86_64", "6Server-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.i686", "6Server-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.ppc64", "6Server-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.s390x", "6Server-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.x86_64", "6Server-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.i686", "6Server-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.ppc64", "6Server-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.s390x", "6Server-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.src", "6Server-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.x86_64", "6Server-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.i686", "6Server-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.ppc64", "6Server-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.s390x", "6Server-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.x86_64", "6Server-optional-6.6.EUS:ntp-doc-0:4.2.6p5-3.el6_6.1.noarch", "6Server-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.i686", "6Server-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.ppc64", "6Server-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.s390x", "6Server-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.x86_64", "6Server-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.i686", "6Server-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.ppc64", "6Server-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.s390x", "6Server-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2520" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "6ComputeNode-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.i686", "6ComputeNode-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.ppc64", "6ComputeNode-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.s390x", "6ComputeNode-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.src", "6ComputeNode-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.x86_64", "6ComputeNode-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.i686", "6ComputeNode-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.ppc64", "6ComputeNode-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.s390x", "6ComputeNode-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.x86_64", "6ComputeNode-6.5.EUS:ntp-doc-0:4.2.6p5-2.el6_5.1.noarch", "6ComputeNode-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.i686", "6ComputeNode-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.ppc64", "6ComputeNode-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.s390x", "6ComputeNode-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.x86_64", "6ComputeNode-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.i686", "6ComputeNode-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.ppc64", "6ComputeNode-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.s390x", "6ComputeNode-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.x86_64", "6ComputeNode-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.i686", "6ComputeNode-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.ppc64", "6ComputeNode-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.s390x", "6ComputeNode-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.src", "6ComputeNode-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.x86_64", "6ComputeNode-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.i686", "6ComputeNode-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.ppc64", "6ComputeNode-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.s390x", "6ComputeNode-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.x86_64", "6ComputeNode-6.6.EUS:ntp-doc-0:4.2.6p5-3.el6_6.1.noarch", "6ComputeNode-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.i686", "6ComputeNode-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.ppc64", "6ComputeNode-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.s390x", "6ComputeNode-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.x86_64", "6ComputeNode-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.i686", "6ComputeNode-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.ppc64", "6ComputeNode-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.s390x", "6ComputeNode-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.x86_64", "6ComputeNode-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.i686", "6ComputeNode-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.ppc64", "6ComputeNode-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.s390x", "6ComputeNode-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.src", "6ComputeNode-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.x86_64", "6ComputeNode-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.i686", "6ComputeNode-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.ppc64", "6ComputeNode-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.s390x", "6ComputeNode-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.x86_64", "6ComputeNode-optional-6.5.EUS:ntp-doc-0:4.2.6p5-2.el6_5.1.noarch", "6ComputeNode-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.i686", "6ComputeNode-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.ppc64", "6ComputeNode-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.s390x", "6ComputeNode-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.x86_64", "6ComputeNode-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.i686", "6ComputeNode-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.ppc64", "6ComputeNode-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.s390x", "6ComputeNode-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.x86_64", "6ComputeNode-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.i686", "6ComputeNode-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.ppc64", "6ComputeNode-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.s390x", "6ComputeNode-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.src", "6ComputeNode-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.x86_64", "6ComputeNode-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.i686", "6ComputeNode-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.ppc64", "6ComputeNode-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.s390x", "6ComputeNode-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.x86_64", "6ComputeNode-optional-6.6.EUS:ntp-doc-0:4.2.6p5-3.el6_6.1.noarch", "6ComputeNode-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.i686", "6ComputeNode-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.ppc64", "6ComputeNode-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.s390x", "6ComputeNode-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.x86_64", "6ComputeNode-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.i686", "6ComputeNode-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.ppc64", "6ComputeNode-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.s390x", "6ComputeNode-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.x86_64", "6Server-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.i686", "6Server-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.ppc64", "6Server-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.s390x", "6Server-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.src", "6Server-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.x86_64", "6Server-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.i686", "6Server-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.ppc64", "6Server-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.s390x", "6Server-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.x86_64", "6Server-6.5.EUS:ntp-doc-0:4.2.6p5-2.el6_5.1.noarch", "6Server-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.i686", "6Server-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.ppc64", "6Server-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.s390x", "6Server-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.x86_64", "6Server-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.i686", "6Server-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.ppc64", "6Server-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.s390x", "6Server-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.x86_64", "6Server-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.i686", "6Server-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.ppc64", "6Server-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.s390x", "6Server-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.src", "6Server-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.x86_64", "6Server-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.i686", "6Server-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.ppc64", "6Server-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.s390x", "6Server-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.x86_64", "6Server-6.6.EUS:ntp-doc-0:4.2.6p5-3.el6_6.1.noarch", "6Server-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.i686", "6Server-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.ppc64", "6Server-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.s390x", "6Server-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.x86_64", "6Server-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.i686", "6Server-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.ppc64", "6Server-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.s390x", "6Server-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.x86_64", "6Server-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.i686", "6Server-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.ppc64", "6Server-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.s390x", "6Server-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.src", "6Server-optional-6.5.EUS:ntp-0:4.2.6p5-2.el6_5.1.x86_64", "6Server-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.i686", "6Server-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.ppc64", "6Server-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.s390x", "6Server-optional-6.5.EUS:ntp-debuginfo-0:4.2.6p5-2.el6_5.1.x86_64", "6Server-optional-6.5.EUS:ntp-doc-0:4.2.6p5-2.el6_5.1.noarch", "6Server-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.i686", "6Server-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.ppc64", "6Server-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.s390x", "6Server-optional-6.5.EUS:ntp-perl-0:4.2.6p5-2.el6_5.1.x86_64", "6Server-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.i686", "6Server-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.ppc64", "6Server-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.s390x", "6Server-optional-6.5.EUS:ntpdate-0:4.2.6p5-2.el6_5.1.x86_64", "6Server-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.i686", "6Server-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.ppc64", "6Server-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.s390x", "6Server-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.src", "6Server-optional-6.6.EUS:ntp-0:4.2.6p5-3.el6_6.1.x86_64", "6Server-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.i686", "6Server-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.ppc64", "6Server-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.s390x", "6Server-optional-6.6.EUS:ntp-debuginfo-0:4.2.6p5-3.el6_6.1.x86_64", "6Server-optional-6.6.EUS:ntp-doc-0:4.2.6p5-3.el6_6.1.noarch", "6Server-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.i686", "6Server-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.ppc64", "6Server-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.s390x", "6Server-optional-6.6.EUS:ntp-perl-0:4.2.6p5-3.el6_6.1.x86_64", "6Server-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.i686", "6Server-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.ppc64", "6Server-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.s390x", "6Server-optional-6.6.EUS:ntpdate-0:4.2.6p5-3.el6_6.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ntp: disabling synchronization via crafted KoD packet" } ] }
rhsa-2015_1930
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated ntp packages that fix two security issues are now available for\nRed Hat Enterprise Linux 6 and 7.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The Network Time Protocol (NTP) is used to synchronize a computer\u0027s time\nwith a referenced time source.\n\nIt was discovered that ntpd as a client did not correctly check timestamps\nin Kiss-of-Death packets. A remote attacker could use this flaw to send a\ncrafted Kiss-of-Death packet to an ntpd client that would increase the\nclient\u0027s polling interval value, and effectively disable synchronization\nwith the server. (CVE-2015-7704)\n\nIt was found that ntpd did not correctly implement the threshold limitation\nfor the \u0027-g\u0027 option, which is used to set the time without any\nrestrictions. A man-in-the-middle attacker able to intercept NTP traffic\nbetween a connecting client and an NTP server could use this flaw to force\nthat client to make multiple steps larger than the panic threshold,\neffectively changing the time to an arbitrary value. (CVE-2015-5300)\n\nRed Hat would like to thank Aanchal Malhotra, Isaac E. Cohen, and Sharon\nGoldberg of Boston University for reporting these issues.\n\nAll ntp users are advised to upgrade to these updated packages, which\ncontain backported patches to resolve these issues. After installing the\nupdate, the ntpd daemon will restart automatically.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1930", "url": "https://access.redhat.com/errata/RHSA-2015:1930" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1271070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271070" }, { "category": "external", "summary": "1271076", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271076" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1930.json" } ], "title": "Red Hat Security Advisory: ntp security update", "tracking": { "current_release_date": "2024-11-22T09:32:45+00:00", "generator": { "date": "2024-11-22T09:32:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:1930", "initial_release_date": "2015-10-26T21:22:37+00:00", "revision_history": [ { "date": "2015-10-26T21:22:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-10-26T21:22:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:32:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-LE-7.1.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-LE-7.1.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-19.ael7b_1.3.noarch", "product": { "name": "ntp-perl-0:4.2.6p5-19.ael7b_1.3.noarch", "product_id": "ntp-perl-0:4.2.6p5-19.ael7b_1.3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-19.ael7b_1.3?arch=noarch" } } }, { "category": "product_version", "name": "ntp-doc-0:4.2.6p5-19.ael7b_1.3.noarch", "product": { "name": "ntp-doc-0:4.2.6p5-19.ael7b_1.3.noarch", "product_id": "ntp-doc-0:4.2.6p5-19.ael7b_1.3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-doc@4.2.6p5-19.ael7b_1.3?arch=noarch" } } }, { "category": "product_version", "name": "ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "product": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "product_id": "ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-doc@4.2.6p5-5.el6_7.2?arch=noarch" } } }, { "category": "product_version", "name": "ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "product": { "name": "ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "product_id": "ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-doc@4.2.6p5-19.el7_1.3?arch=noarch" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "product": { "name": "ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "product_id": "ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-19.el7_1.3?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-19.ael7b_1.3.ppc64le", "product": { "name": "ntp-debuginfo-0:4.2.6p5-19.ael7b_1.3.ppc64le", "product_id": "ntp-debuginfo-0:4.2.6p5-19.ael7b_1.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-19.ael7b_1.3?arch=ppc64le" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "product": { "name": "sntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "product_id": "sntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-19.ael7b_1.3?arch=ppc64le" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "product": { "name": "ntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "product_id": "ntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-19.ael7b_1.3?arch=ppc64le" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-19.ael7b_1.3.ppc64le", "product": { "name": "ntpdate-0:4.2.6p5-19.ael7b_1.3.ppc64le", "product_id": "ntpdate-0:4.2.6p5-19.ael7b_1.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-19.ael7b_1.3?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ntp-0:4.2.6p5-19.ael7b_1.3.src", "product": { "name": "ntp-0:4.2.6p5-19.ael7b_1.3.src", "product_id": "ntp-0:4.2.6p5-19.ael7b_1.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-19.ael7b_1.3?arch=src" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.2.src", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.2.src", "product_id": "ntp-0:4.2.6p5-5.el6_7.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.2?arch=src" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-19.el7_1.3.src", "product": { "name": "ntp-0:4.2.6p5-19.el7_1.3.src", "product_id": "ntp-0:4.2.6p5-19.el7_1.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-19.el7_1.3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.2?arch=s390x" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.2.s390x", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.2.s390x", "product_id": "ntp-0:4.2.6p5-5.el6_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.2?arch=s390x" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.2?arch=s390x" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.2?arch=s390x" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "product": { "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "product_id": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-19.el7_1.3?arch=s390x" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "product": { "name": "ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "product_id": "ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-19.el7_1.3?arch=s390x" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-19.el7_1.3.s390x", "product": { "name": "ntp-0:4.2.6p5-19.el7_1.3.s390x", "product_id": "ntp-0:4.2.6p5-19.el7_1.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-19.el7_1.3?arch=s390x" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-19.el7_1.3.s390x", "product": { "name": "sntp-0:4.2.6p5-19.el7_1.3.s390x", "product_id": "sntp-0:4.2.6p5-19.el7_1.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-19.el7_1.3?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.2?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.2.x86_64", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.2.x86_64", "product_id": "ntp-0:4.2.6p5-5.el6_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.2?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.2?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.2?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "product_id": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-19.el7_1.3?arch=x86_64" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-19.el7_1.3.x86_64", "product": { "name": "sntp-0:4.2.6p5-19.el7_1.3.x86_64", "product_id": "sntp-0:4.2.6p5-19.el7_1.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-19.el7_1.3?arch=x86_64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "product": { "name": "ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "product_id": "ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-19.el7_1.3?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-19.el7_1.3.x86_64", "product": { "name": "ntp-0:4.2.6p5-19.el7_1.3.x86_64", "product_id": "ntp-0:4.2.6p5-19.el7_1.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-19.el7_1.3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.2?arch=ppc64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.2?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.2.ppc64", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.2.ppc64", "product_id": "ntp-0:4.2.6p5-5.el6_7.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.2?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.2?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "product_id": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-19.el7_1.3?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-19.el7_1.3.ppc64", "product": { "name": "ntp-0:4.2.6p5-19.el7_1.3.ppc64", "product_id": "ntp-0:4.2.6p5-19.el7_1.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-19.el7_1.3?arch=ppc64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "product": { "name": "ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "product_id": "ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-19.el7_1.3?arch=ppc64" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-19.el7_1.3.ppc64", "product": { "name": "sntp-0:4.2.6p5-19.el7_1.3.ppc64", "product_id": "sntp-0:4.2.6p5-19.el7_1.3.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-19.el7_1.3?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6_7.2.i686", "product": { "name": "ntp-0:4.2.6p5-5.el6_7.2.i686", "product_id": "ntp-0:4.2.6p5-5.el6_7.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6_7.2?arch=i686" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6_7.2?arch=i686" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6_7.2.i686", "product": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.i686", "product_id": "ntpdate-0:4.2.6p5-5.el6_7.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6_7.2?arch=i686" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "product_id": "ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6_7.2?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.src", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.2.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6Client-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.src", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.2.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.src", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.2.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.src", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.2.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.src", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.2.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.src", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.2.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.src", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.2.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.src", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6_7.2.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.i686", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6_7.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.src", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-19.el7_1.3.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-19.el7_1.3.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "sntp-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "sntp-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "sntp-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7Client-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.src", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-19.el7_1.3.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-19.el7_1.3.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "sntp-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "sntp-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "sntp-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7Client-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.src", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-19.el7_1.3.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-19.el7_1.3.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "sntp-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "sntp-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "sntp-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.src", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-19.el7_1.3.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-19.el7_1.3.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "sntp-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "sntp-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "sntp-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.src", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-19.el7_1.3.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-19.el7_1.3.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "sntp-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "sntp-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "sntp-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7Server-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.ael7b_1.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.ael7b_1.3.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.src" }, "product_reference": "ntp-0:4.2.6p5-19.ael7b_1.3.src", "relates_to_product_reference": "7Server-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-19.ael7b_1.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-LE-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.ael7b_1.3.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-19.ael7b_1.3.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-19.ael7b_1.3.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-LE-7.1.Z:ntp-doc-0:4.2.6p5-19.ael7b_1.3.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-19.ael7b_1.3.noarch", "relates_to_product_reference": "7Server-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-19.ael7b_1.3.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-LE-7.1.Z:ntp-perl-0:4.2.6p5-19.ael7b_1.3.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-19.ael7b_1.3.noarch", "relates_to_product_reference": "7Server-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-19.ael7b_1.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-LE-7.1.Z:ntpdate-0:4.2.6p5-19.ael7b_1.3.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-19.ael7b_1.3.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-19.ael7b_1.3.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-LE-7.1.Z:sntp-0:4.2.6p5-19.ael7b_1.3.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.src", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-19.el7_1.3.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-19.el7_1.3.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "sntp-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "sntp-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "sntp-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7Server-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.ael7b_1.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.ael7b_1.3.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.src" }, "product_reference": "ntp-0:4.2.6p5-19.ael7b_1.3.src", "relates_to_product_reference": "7Server-optional-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-19.ael7b_1.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-LE-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.ael7b_1.3.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-19.ael7b_1.3.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-19.ael7b_1.3.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-LE-7.1.Z:ntp-doc-0:4.2.6p5-19.ael7b_1.3.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-19.ael7b_1.3.noarch", "relates_to_product_reference": "7Server-optional-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-19.ael7b_1.3.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-LE-7.1.Z:ntp-perl-0:4.2.6p5-19.ael7b_1.3.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-19.ael7b_1.3.noarch", "relates_to_product_reference": "7Server-optional-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-19.ael7b_1.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-LE-7.1.Z:ntpdate-0:4.2.6p5-19.ael7b_1.3.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-19.ael7b_1.3.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-19.ael7b_1.3.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-LE-7.1.Z:sntp-0:4.2.6p5-19.ael7b_1.3.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.src", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-19.el7_1.3.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-19.el7_1.3.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "sntp-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "sntp-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "sntp-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7Workstation-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.src", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "ntp-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-19.el7_1.3.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-19.el7_1.3.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-19.el7_1.3.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64" }, "product_reference": "sntp-0:4.2.6p5-19.el7_1.3.ppc64", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-19.el7_1.3.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x" }, "product_reference": "sntp-0:4.2.6p5-19.el7_1.3.s390x", "relates_to_product_reference": "7Workstation-optional-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-19.el7_1.3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64" }, "product_reference": "sntp-0:4.2.6p5-19.el7_1.3.x86_64", "relates_to_product_reference": "7Workstation-optional-7.1.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Aanchal Malhotra", "Isaac E. Cohen", "Sharon Goldberg" ], "organization": "Boston University" } ], "cve": "CVE-2015-5300", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2015-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1271076" } ], "notes": [ { "category": "description", "text": "It was found that ntpd did not correctly implement the threshold limitation for the \u0027-g\u0027 option, which is used to set the time without any restrictions. A man-in-the-middle attacker able to intercept NTP traffic between a connecting client and an NTP server could use this flaw to force that client to make multiple steps larger than the panic threshold, effectively changing the time to an arbitrary value at any time.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: MITM attacker can force ntpd to make a step larger than the panic threshold", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Client-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Client-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Client-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Client-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Client-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Client-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Client-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Client-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Client-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Client-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7ComputeNode-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7ComputeNode-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7ComputeNode-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7ComputeNode-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Server-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Server-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Server-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Server-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Server-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.src", "7Server-LE-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-LE-7.1.Z:ntp-doc-0:4.2.6p5-19.ael7b_1.3.noarch", "7Server-LE-7.1.Z:ntp-perl-0:4.2.6p5-19.ael7b_1.3.noarch", "7Server-LE-7.1.Z:ntpdate-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-LE-7.1.Z:sntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Server-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Server-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Server-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Server-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Server-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-optional-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-optional-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.src", "7Server-optional-LE-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-optional-LE-7.1.Z:ntp-doc-0:4.2.6p5-19.ael7b_1.3.noarch", "7Server-optional-LE-7.1.Z:ntp-perl-0:4.2.6p5-19.ael7b_1.3.noarch", "7Server-optional-LE-7.1.Z:ntpdate-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-optional-LE-7.1.Z:sntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Workstation-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Workstation-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Workstation-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Workstation-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-5300" }, { "category": "external", "summary": "RHBZ#1271076", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271076" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-5300", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5300" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-5300", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5300" }, { "category": "external", "summary": "https://www.cs.bu.edu/~goldbe/NTPattack.html", "url": "https://www.cs.bu.edu/~goldbe/NTPattack.html" } ], "release_date": "2015-10-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-10-26T21:22:37+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Client-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Client-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Client-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Client-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Client-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Client-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Client-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Client-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Client-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Client-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7ComputeNode-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7ComputeNode-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7ComputeNode-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7ComputeNode-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Server-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Server-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Server-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Server-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Server-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.src", "7Server-LE-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-LE-7.1.Z:ntp-doc-0:4.2.6p5-19.ael7b_1.3.noarch", "7Server-LE-7.1.Z:ntp-perl-0:4.2.6p5-19.ael7b_1.3.noarch", "7Server-LE-7.1.Z:ntpdate-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-LE-7.1.Z:sntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Server-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Server-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Server-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Server-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Server-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-optional-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-optional-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.src", "7Server-optional-LE-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-optional-LE-7.1.Z:ntp-doc-0:4.2.6p5-19.ael7b_1.3.noarch", "7Server-optional-LE-7.1.Z:ntp-perl-0:4.2.6p5-19.ael7b_1.3.noarch", "7Server-optional-LE-7.1.Z:ntpdate-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-optional-LE-7.1.Z:sntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Workstation-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Workstation-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Workstation-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Workstation-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1930" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Client-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Client-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Client-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Client-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Client-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Client-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Client-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Client-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Client-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Client-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7ComputeNode-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7ComputeNode-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7ComputeNode-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7ComputeNode-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Server-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Server-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Server-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Server-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Server-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.src", "7Server-LE-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-LE-7.1.Z:ntp-doc-0:4.2.6p5-19.ael7b_1.3.noarch", "7Server-LE-7.1.Z:ntp-perl-0:4.2.6p5-19.ael7b_1.3.noarch", "7Server-LE-7.1.Z:ntpdate-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-LE-7.1.Z:sntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Server-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Server-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Server-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Server-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Server-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-optional-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-optional-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.src", "7Server-optional-LE-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-optional-LE-7.1.Z:ntp-doc-0:4.2.6p5-19.ael7b_1.3.noarch", "7Server-optional-LE-7.1.Z:ntp-perl-0:4.2.6p5-19.ael7b_1.3.noarch", "7Server-optional-LE-7.1.Z:ntpdate-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-optional-LE-7.1.Z:sntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Workstation-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Workstation-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Workstation-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Workstation-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: MITM attacker can force ntpd to make a step larger than the panic threshold" }, { "acknowledgments": [ { "names": [ "Aanchal Malhotra", "Isaac E. Cohen", "Sharon Goldberg" ], "organization": "Boston University" } ], "cve": "CVE-2015-7704", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2015-10-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1271070" } ], "notes": [ { "category": "description", "text": "It was discovered that ntpd as a client did not correctly check timestamps in Kiss-of-Death packets. A remote attacker could use this flaw to send a crafted Kiss-of-Death packet to an ntpd client that would increase the client\u0027s polling interval value, and effectively disable synchronization with the server.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: disabling synchronization via crafted KoD packet", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of ntp as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.4, as they do not include support for KoD packets.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Client-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Client-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Client-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Client-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Client-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Client-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Client-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Client-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Client-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Client-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7ComputeNode-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7ComputeNode-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7ComputeNode-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7ComputeNode-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Server-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Server-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Server-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Server-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Server-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.src", "7Server-LE-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-LE-7.1.Z:ntp-doc-0:4.2.6p5-19.ael7b_1.3.noarch", "7Server-LE-7.1.Z:ntp-perl-0:4.2.6p5-19.ael7b_1.3.noarch", "7Server-LE-7.1.Z:ntpdate-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-LE-7.1.Z:sntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Server-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Server-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Server-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Server-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Server-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-optional-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-optional-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.src", "7Server-optional-LE-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-optional-LE-7.1.Z:ntp-doc-0:4.2.6p5-19.ael7b_1.3.noarch", "7Server-optional-LE-7.1.Z:ntp-perl-0:4.2.6p5-19.ael7b_1.3.noarch", "7Server-optional-LE-7.1.Z:ntpdate-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-optional-LE-7.1.Z:sntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Workstation-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Workstation-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Workstation-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Workstation-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7704" }, { "category": "external", "summary": "RHBZ#1271070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271070" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7704", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7704" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7704", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7704" }, { "category": "external", "summary": "https://www.cs.bu.edu/~goldbe/NTPattack.html", "url": "https://www.cs.bu.edu/~goldbe/NTPattack.html" } ], "release_date": "2015-10-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-10-26T21:22:37+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Client-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Client-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Client-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Client-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Client-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Client-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Client-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Client-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Client-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Client-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7ComputeNode-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7ComputeNode-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7ComputeNode-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7ComputeNode-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Server-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Server-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Server-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Server-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Server-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.src", "7Server-LE-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-LE-7.1.Z:ntp-doc-0:4.2.6p5-19.ael7b_1.3.noarch", "7Server-LE-7.1.Z:ntp-perl-0:4.2.6p5-19.ael7b_1.3.noarch", "7Server-LE-7.1.Z:ntpdate-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-LE-7.1.Z:sntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Server-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Server-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Server-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Server-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Server-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-optional-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-optional-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.src", "7Server-optional-LE-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-optional-LE-7.1.Z:ntp-doc-0:4.2.6p5-19.ael7b_1.3.noarch", "7Server-optional-LE-7.1.Z:ntp-perl-0:4.2.6p5-19.ael7b_1.3.noarch", "7Server-optional-LE-7.1.Z:ntpdate-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-optional-LE-7.1.Z:sntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Workstation-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Workstation-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Workstation-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Workstation-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1930" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Client-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Client-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Client-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Client-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Client-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Client-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Client-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Client-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6ComputeNode-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6ComputeNode-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6ComputeNode-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Server-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Server-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Server-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Server-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Server-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Server-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Server-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Server-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Workstation-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.src", "6Workstation-optional-6.7.z:ntp-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-optional-6.7.z:ntp-debuginfo-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-optional-6.7.z:ntp-doc-0:4.2.6p5-5.el6_7.2.noarch", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-optional-6.7.z:ntp-perl-0:4.2.6p5-5.el6_7.2.x86_64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.i686", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.ppc64", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.s390x", "6Workstation-optional-6.7.z:ntpdate-0:4.2.6p5-5.el6_7.2.x86_64", "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Client-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Client-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Client-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Client-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Client-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Client-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Client-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Client-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Client-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Client-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Client-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Client-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Client-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Client-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7ComputeNode-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7ComputeNode-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7ComputeNode-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7ComputeNode-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7ComputeNode-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7ComputeNode-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7ComputeNode-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7ComputeNode-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7ComputeNode-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Server-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Server-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Server-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Server-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Server-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Server-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.src", "7Server-LE-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-LE-7.1.Z:ntp-doc-0:4.2.6p5-19.ael7b_1.3.noarch", "7Server-LE-7.1.Z:ntp-perl-0:4.2.6p5-19.ael7b_1.3.noarch", "7Server-LE-7.1.Z:ntpdate-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-LE-7.1.Z:sntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Server-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Server-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Server-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Server-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Server-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Server-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Server-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Server-optional-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-optional-LE-7.1.Z:ntp-0:4.2.6p5-19.ael7b_1.3.src", "7Server-optional-LE-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-optional-LE-7.1.Z:ntp-doc-0:4.2.6p5-19.ael7b_1.3.noarch", "7Server-optional-LE-7.1.Z:ntp-perl-0:4.2.6p5-19.ael7b_1.3.noarch", "7Server-optional-LE-7.1.Z:ntpdate-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Server-optional-LE-7.1.Z:sntp-0:4.2.6p5-19.ael7b_1.3.ppc64le", "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Workstation-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Workstation-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Workstation-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.src", "7Workstation-optional-7.1.Z:ntp-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-optional-7.1.Z:ntp-debuginfo-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-optional-7.1.Z:ntp-doc-0:4.2.6p5-19.el7_1.3.noarch", "7Workstation-optional-7.1.Z:ntp-perl-0:4.2.6p5-19.el7_1.3.noarch", "7Workstation-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-optional-7.1.Z:ntpdate-0:4.2.6p5-19.el7_1.3.x86_64", "7Workstation-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.ppc64", "7Workstation-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.s390x", "7Workstation-optional-7.1.Z:sntp-0:4.2.6p5-19.el7_1.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "ntp: disabling synchronization via crafted KoD packet" } ] }
gsd-2015-7704
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2015-7704", "description": "The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted \"KOD\" messages.", "id": "GSD-2015-7704", "references": [ "https://www.suse.com/security/cve/CVE-2015-7704.html", "https://www.debian.org/security/2015/dsa-3388", "https://access.redhat.com/errata/RHSA-2015:2520", "https://access.redhat.com/errata/RHSA-2015:1930", "https://ubuntu.com/security/CVE-2015-7704", "https://advisories.mageia.org/CVE-2015-7704.html", "https://alas.aws.amazon.com/cve/html/CVE-2015-7704.html", "https://linux.oracle.com/cve/CVE-2015-7704.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-7704" ], "details": "The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted \"KOD\" messages.", "id": "GSD-2015-7704", "modified": "2023-12-13T01:20:01.852088Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-7704", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted \"KOD\" messages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1271070", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271070" }, { "name": "RHSA-2015:1930", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1930.html" }, { "name": "77280", "refsource": "BID", "url": "http://www.securityfocus.com/bid/77280" }, { "name": "VU#718152", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/718152" }, { "name": "http://bugs.ntp.org/show_bug.cgi?id=2901", "refsource": "CONFIRM", "url": "http://bugs.ntp.org/show_bug.cgi?id=2901" }, { "name": "https://support.citrix.com/article/CTX220112", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX220112" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "https://security.netapp.com/advisory/ntap-20171004-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "name": "1033951", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1033951" }, { "name": "http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_4_2_8p4_Securit", "refsource": "CONFIRM", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_4_2_8p4_Securit" }, { "name": "DSA-3388", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3388" }, { "name": "https://www.cs.bu.edu/~goldbe/NTPattack.html", "refsource": "MISC", "url": "https://www.cs.bu.edu/~goldbe/NTPattack.html" }, { "name": "https://eprint.iacr.org/2015/1020.pdf", "refsource": "MISC", "url": "https://eprint.iacr.org/2015/1020.pdf" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05270839", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05270839" }, { "name": "RHSA-2015:2520", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-2520.html" }, { "name": "http://support.ntp.org/bin/view/Main/NtpBug2901", "refsource": "CONFIRM", "url": "http://support.ntp.org/bin/view/Main/NtpBug2901" }, { "name": "GLSA-201607-15", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201607-15" }, { "name": "https://security.netapp.com/advisory/ntap-20171004-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20171004-0001/" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10284", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10284" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.2.8", "versionStartIncluding": "4.2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.3.77", "versionStartIncluding": "4.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netapp:data_ontap:-:*:*:*:*:7-mode:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mcafee:enterprise_security_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.4.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:enterprise_security_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "11.2.0", "versionStartIncluding": "11.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:citrix:xenserver:6.2.0:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:citrix:xenserver:6.5:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-7704" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted \"KOD\" messages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "VU#718152", "refsource": "CERT-VN", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/718152" }, { "name": "https://www.cs.bu.edu/~goldbe/NTPattack.html", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://www.cs.bu.edu/~goldbe/NTPattack.html" }, { "name": "https://eprint.iacr.org/2015/1020.pdf", "refsource": "MISC", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://eprint.iacr.org/2015/1020.pdf" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1271070", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271070" }, { "name": "http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_4_2_8p4_Securit", "refsource": "CONFIRM", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_4_2_8p4_Securit" }, { "name": "http://support.ntp.org/bin/view/Main/NtpBug2901", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/NtpBug2901" }, { "name": "http://bugs.ntp.org/show_bug.cgi?id=2901", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "http://bugs.ntp.org/show_bug.cgi?id=2901" }, { "name": "GLSA-201607-15", "refsource": "GENTOO", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://security.gentoo.org/glsa/201607-15" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05270839", "refsource": "CONFIRM", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05270839" }, { "name": "77280", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/77280" }, { "name": "1033951", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1033951" }, { "name": "DSA-3388", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2015/dsa-3388" }, { "name": "https://security.netapp.com/advisory/ntap-20171004-0002/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "name": "https://security.netapp.com/advisory/ntap-20171004-0001/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20171004-0001/" }, { "name": "https://support.citrix.com/article/CTX220112", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.citrix.com/article/CTX220112" }, { "name": "RHSA-2015:2520", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2520.html" }, { "name": "RHSA-2015:1930", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1930.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10284", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10284" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016", "refsource": "MISC", "tags": [], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": true, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2021-11-17T22:15Z", "publishedDate": "2017-08-07T20:29Z" } } }
var-201708-1547
Vulnerability from variot
The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted "KOD" messages. The NTP.org reference implementation of ntpd contains multiple vulnerabilities. NTP Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Network Time Protocol is prone to a denial-of-service vulnerability. An attacker can leverage this issue to cause a denial-of-service condition. Oracle Integrated Lights Out Manager is prone to a remote security vulnerability in ILOM. The vulnerability can be exploited over the 'SSH' protocol. The 'SSH' sub component is affected. This vulnerability affects the following supported versions: 3.0, 3.1, 3.2 NOTE: This BID is being retired as it is a duplicate of BID 75990 (OpenSSH Login Handling Security Bypass Weakness). Summary:
Updated ntp packages that fix two security issues are now available for Red Hat Enterprise Linux 6 and 7.
Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64
It was discovered that ntpd as a client did not correctly check timestamps in Kiss-of-Death packets. (CVE-2015-7704)
It was found that ntpd did not correctly implement the threshold limitation for the '-g' option, which is used to set the time without any restrictions. A man-in-the-middle attacker able to intercept NTP traffic between a connecting client and an NTP server could use this flaw to force that client to make multiple steps larger than the panic threshold, effectively changing the time to an arbitrary value. (CVE-2015-5300)
Red Hat would like to thank Aanchal Malhotra, Isaac E. Cohen, and Sharon Goldberg of Boston University for reporting these issues.
All ntp users are advised to upgrade to these updated packages, which contain backported patches to resolve these issues. Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1271070 - CVE-2015-7704 ntp: disabling synchronization via crafted KoD packet 1271076 - CVE-2015-5300 ntp: MITM attacker can force ntpd to make a step larger than the panic threshold
- Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source: ntp-4.2.6p5-5.el6_7.2.src.rpm
i386: ntp-4.2.6p5-5.el6_7.2.i686.rpm ntp-debuginfo-4.2.6p5-5.el6_7.2.i686.rpm ntpdate-4.2.6p5-5.el6_7.2.i686.rpm
x86_64: ntp-4.2.6p5-5.el6_7.2.x86_64.rpm ntp-debuginfo-4.2.6p5-5.el6_7.2.x86_64.rpm ntpdate-4.2.6p5-5.el6_7.2.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
i386: ntp-debuginfo-4.2.6p5-5.el6_7.2.i686.rpm ntp-perl-4.2.6p5-5.el6_7.2.i686.rpm
noarch: ntp-doc-4.2.6p5-5.el6_7.2.noarch.rpm
x86_64: ntp-debuginfo-4.2.6p5-5.el6_7.2.x86_64.rpm ntp-perl-4.2.6p5-5.el6_7.2.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: ntp-4.2.6p5-5.el6_7.2.src.rpm
x86_64: ntp-4.2.6p5-5.el6_7.2.x86_64.rpm ntp-debuginfo-4.2.6p5-5.el6_7.2.x86_64.rpm ntpdate-4.2.6p5-5.el6_7.2.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
noarch: ntp-doc-4.2.6p5-5.el6_7.2.noarch.rpm
x86_64: ntp-debuginfo-4.2.6p5-5.el6_7.2.x86_64.rpm ntp-perl-4.2.6p5-5.el6_7.2.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: ntp-4.2.6p5-5.el6_7.2.src.rpm
i386: ntp-4.2.6p5-5.el6_7.2.i686.rpm ntp-debuginfo-4.2.6p5-5.el6_7.2.i686.rpm ntpdate-4.2.6p5-5.el6_7.2.i686.rpm
ppc64: ntp-4.2.6p5-5.el6_7.2.ppc64.rpm ntp-debuginfo-4.2.6p5-5.el6_7.2.ppc64.rpm ntpdate-4.2.6p5-5.el6_7.2.ppc64.rpm
s390x: ntp-4.2.6p5-5.el6_7.2.s390x.rpm ntp-debuginfo-4.2.6p5-5.el6_7.2.s390x.rpm ntpdate-4.2.6p5-5.el6_7.2.s390x.rpm
x86_64: ntp-4.2.6p5-5.el6_7.2.x86_64.rpm ntp-debuginfo-4.2.6p5-5.el6_7.2.x86_64.rpm ntpdate-4.2.6p5-5.el6_7.2.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
i386: ntp-debuginfo-4.2.6p5-5.el6_7.2.i686.rpm ntp-perl-4.2.6p5-5.el6_7.2.i686.rpm
noarch: ntp-doc-4.2.6p5-5.el6_7.2.noarch.rpm
ppc64: ntp-debuginfo-4.2.6p5-5.el6_7.2.ppc64.rpm ntp-perl-4.2.6p5-5.el6_7.2.ppc64.rpm
s390x: ntp-debuginfo-4.2.6p5-5.el6_7.2.s390x.rpm ntp-perl-4.2.6p5-5.el6_7.2.s390x.rpm
x86_64: ntp-debuginfo-4.2.6p5-5.el6_7.2.x86_64.rpm ntp-perl-4.2.6p5-5.el6_7.2.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: ntp-4.2.6p5-5.el6_7.2.src.rpm
i386: ntp-4.2.6p5-5.el6_7.2.i686.rpm ntp-debuginfo-4.2.6p5-5.el6_7.2.i686.rpm ntpdate-4.2.6p5-5.el6_7.2.i686.rpm
x86_64: ntp-4.2.6p5-5.el6_7.2.x86_64.rpm ntp-debuginfo-4.2.6p5-5.el6_7.2.x86_64.rpm ntpdate-4.2.6p5-5.el6_7.2.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
i386: ntp-debuginfo-4.2.6p5-5.el6_7.2.i686.rpm ntp-perl-4.2.6p5-5.el6_7.2.i686.rpm
noarch: ntp-doc-4.2.6p5-5.el6_7.2.noarch.rpm
x86_64: ntp-debuginfo-4.2.6p5-5.el6_7.2.x86_64.rpm ntp-perl-4.2.6p5-5.el6_7.2.x86_64.rpm
Red Hat Enterprise Linux Client (v. 7):
Source: ntp-4.2.6p5-19.el7_1.3.src.rpm
x86_64: ntp-4.2.6p5-19.el7_1.3.x86_64.rpm ntp-debuginfo-4.2.6p5-19.el7_1.3.x86_64.rpm ntpdate-4.2.6p5-19.el7_1.3.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
noarch: ntp-doc-4.2.6p5-19.el7_1.3.noarch.rpm ntp-perl-4.2.6p5-19.el7_1.3.noarch.rpm
x86_64: ntp-debuginfo-4.2.6p5-19.el7_1.3.x86_64.rpm sntp-4.2.6p5-19.el7_1.3.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: ntp-4.2.6p5-19.el7_1.3.src.rpm
x86_64: ntp-4.2.6p5-19.el7_1.3.x86_64.rpm ntp-debuginfo-4.2.6p5-19.el7_1.3.x86_64.rpm ntpdate-4.2.6p5-19.el7_1.3.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
noarch: ntp-doc-4.2.6p5-19.el7_1.3.noarch.rpm ntp-perl-4.2.6p5-19.el7_1.3.noarch.rpm
x86_64: ntp-debuginfo-4.2.6p5-19.el7_1.3.x86_64.rpm sntp-4.2.6p5-19.el7_1.3.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: ntp-4.2.6p5-19.el7_1.3.src.rpm
ppc64: ntp-4.2.6p5-19.el7_1.3.ppc64.rpm ntp-debuginfo-4.2.6p5-19.el7_1.3.ppc64.rpm ntpdate-4.2.6p5-19.el7_1.3.ppc64.rpm
s390x: ntp-4.2.6p5-19.el7_1.3.s390x.rpm ntp-debuginfo-4.2.6p5-19.el7_1.3.s390x.rpm ntpdate-4.2.6p5-19.el7_1.3.s390x.rpm
x86_64: ntp-4.2.6p5-19.el7_1.3.x86_64.rpm ntp-debuginfo-4.2.6p5-19.el7_1.3.x86_64.rpm ntpdate-4.2.6p5-19.el7_1.3.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: ntp-4.2.6p5-19.ael7b_1.3.src.rpm
ppc64le: ntp-4.2.6p5-19.ael7b_1.3.ppc64le.rpm ntp-debuginfo-4.2.6p5-19.ael7b_1.3.ppc64le.rpm ntpdate-4.2.6p5-19.ael7b_1.3.ppc64le.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
noarch: ntp-doc-4.2.6p5-19.el7_1.3.noarch.rpm ntp-perl-4.2.6p5-19.el7_1.3.noarch.rpm
ppc64: ntp-debuginfo-4.2.6p5-19.el7_1.3.ppc64.rpm sntp-4.2.6p5-19.el7_1.3.ppc64.rpm
s390x: ntp-debuginfo-4.2.6p5-19.el7_1.3.s390x.rpm sntp-4.2.6p5-19.el7_1.3.s390x.rpm
x86_64: ntp-debuginfo-4.2.6p5-19.el7_1.3.x86_64.rpm sntp-4.2.6p5-19.el7_1.3.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
noarch: ntp-doc-4.2.6p5-19.ael7b_1.3.noarch.rpm ntp-perl-4.2.6p5-19.ael7b_1.3.noarch.rpm
ppc64le: ntp-debuginfo-4.2.6p5-19.ael7b_1.3.ppc64le.rpm sntp-4.2.6p5-19.ael7b_1.3.ppc64le.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: ntp-4.2.6p5-19.el7_1.3.src.rpm
x86_64: ntp-4.2.6p5-19.el7_1.3.x86_64.rpm ntp-debuginfo-4.2.6p5-19.el7_1.3.x86_64.rpm ntpdate-4.2.6p5-19.el7_1.3.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
noarch: ntp-doc-4.2.6p5-19.el7_1.3.noarch.rpm ntp-perl-4.2.6p5-19.el7_1.3.noarch.rpm
x86_64: ntp-debuginfo-4.2.6p5-19.el7_1.3.x86_64.rpm sntp-4.2.6p5-19.el7_1.3.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2015-5300 https://access.redhat.com/security/cve/CVE-2015-7704 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc.
Gentoo Linux Security Advisory GLSA 201607-15
https://security.gentoo.org/
Severity: Normal Title: NTP: Multiple vulnerabilities Date: July 20, 2016 Bugs: #563774, #572452, #581528, #584954 ID: 201607-15
Synopsis
Multiple vulnerabilities have been found in NTP, the worst of which could lead to Denial of Service.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-misc/ntp < 4.2.8_p8 >= 4.2.8_p8
Description
Multiple vulnerabilities have been discovered in NTP. Please review the CVE identifiers referenced below for details.
Resolution
All NTP users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/ntp-4.2.8_p8"
References
[ 1 ] CVE-2015-7691 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7691 [ 2 ] CVE-2015-7692 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7692 [ 3 ] CVE-2015-7701 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7701 [ 4 ] CVE-2015-7702 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7702 [ 5 ] CVE-2015-7703 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7703 [ 6 ] CVE-2015-7704 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7704 [ 7 ] CVE-2015-7705 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7705 [ 8 ] CVE-2015-7848 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7848 [ 9 ] CVE-2015-7849 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7849 [ 10 ] CVE-2015-7850 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7850 [ 11 ] CVE-2015-7851 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7851 [ 12 ] CVE-2015-7852 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7852 [ 13 ] CVE-2015-7853 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7853 [ 14 ] CVE-2015-7854 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7854 [ 15 ] CVE-2015-7855 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7855 [ 16 ] CVE-2015-7871 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7871 [ 17 ] CVE-2015-7973 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7973 [ 18 ] CVE-2015-7974 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7974 [ 19 ] CVE-2015-7975 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7975 [ 20 ] CVE-2015-7976 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7976 [ 21 ] CVE-2015-7977 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7977 [ 22 ] CVE-2015-7978 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7978 [ 23 ] CVE-2015-7979 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7979 [ 24 ] CVE-2015-8138 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8138 [ 25 ] CVE-2015-8139 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8139 [ 26 ] CVE-2015-8140 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8140 [ 27 ] CVE-2015-8158 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8158 [ 28 ] CVE-2016-1547 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1547 [ 29 ] CVE-2016-1548 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1548 [ 30 ] CVE-2016-1549 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1549 [ 31 ] CVE-2016-1550 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1550 [ 32 ] CVE-2016-1551 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1551 [ 33 ] CVE-2016-2516 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2516 [ 34 ] CVE-2016-2517 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2517 [ 35 ] CVE-2016-2518 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2518 [ 36 ] CVE-2016-2519 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2519 [ 37 ] CVE-2016-4953 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4953 [ 38 ] CVE-2016-4954 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4954 [ 39 ] CVE-2016-4955 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4955 [ 40 ] CVE-2016-4956 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4956 [ 41 ] CVE-2016-4957 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4957
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201607-15
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
.
Release Date: 2016-09-21 Last Updated: 2016-09-21
Potential Security Impact: Multiple Remote Vulnerabilities
Source: Hewlett Packard Enterprise, Product Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities in NTP have been addressed with HPE Comware 7 (CW7) network products.
References:
- CVE-2015-7704
- CVE-2015-7705
- CVE-2015-7855
- CVE-2015-7871
- PSRT110228
- SSRT102943
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. - Comware 7 (CW7) Products - Please refer to the RESOLUTION below for a list of impacted products. All product versions are impacted prior to the fixed versions listed.
BACKGROUND
CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
CVE-2015-7704
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
6.4 (AV:N/AC:L/Au:N/C:N/I:P/A:P)
CVE-2015-7705
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
6.4 (AV:N/AC:L/Au:N/C:N/I:P/A:P)
CVE-2015-7855
6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
6.4 (AV:N/AC:L/Au:N/C:N/I:P/A:P)
CVE-2015-7871
5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)
Information on CVSS is documented in
HPE Customer Notice HPSN-2008-002 here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499
RESOLUTION HPE has released the following software updates to resolve the vulnerabilities in HPE Comware 7 network products.
COMWARE 7 Products
- 12500 (Comware 7) - Version: R7377
- HP Network Products
- JC072B HP 12500 Main Processing Unit
- JC085A HP A12518 Switch Chassis
- JC086A HP A12508 Switch Chassis
- JC652A HP 12508 DC Switch Chassis
- JC653A HP 12518 DC Switch Chassis
- JC654A HP 12504 AC Switch Chassis
- JC655A HP 12504 DC Switch Chassis
- JF430A HP A12518 Switch Chassis
- JF430B HP 12518 Switch Chassis
- JF430C HP 12518 AC Switch Chassis
- JF431A HP A12508 Switch Chassis
- JF431B HP 12508 Switch Chassis
- JF431C HP 12508 AC Switch Chassis
- JG497A HP 12500 MPU w/Comware V7 OS
- JG782A HP FF 12508E AC Switch Chassis
- JG783A HP FF 12508E DC Switch Chassis
- JG784A HP FF 12518E AC Switch Chassis
- JG785A HP FF 12518E DC Switch Chassis
- JG802A HP FF 12500E MPU
- 10500 (Comware 7) - Version: R7178
- HP Network Products
- JC611A HP 10508-V Switch Chassis
- JC612A HP 10508 Switch Chassis
- JC613A HP 10504 Switch Chassis
- JC748A HP 10512 Switch Chassis
- JG608A HP FlexFabric 11908-V Switch Chassis
- JG609A HP FlexFabric 11900 Main Processing Unit
- JG820A HP 10504 TAA Switch Chassis
- JG821A HP 10508 TAA Switch Chassis
- JG822A HP 10508-V TAA Switch Chassis
- JG823A HP 10512 TAA Switch Chassis
- JG496A HP 10500 Type A MPU w/Comware v7 OS
- JH198A HP 10500 Type D Main Processing Unit with Comware v7 Operating System
- JH206A HP 10500 Type D TAA-compliant with Comware v7 Operating System Main Processing Unit
- 12900 (Comware 7) - Version: R1138P03
- HP Network Products
- JG619A HP FlexFabric 12910 Switch AC Chassis
- JG621A HP FlexFabric 12910 Main Processing Unit
- JG632A HP FlexFabric 12916 Switch AC Chassis
- JG634A HP FlexFabric 12916 Main Processing Unit
- JH104A HP FlexFabric 12900E Main Processing Unit
- JH114A HP FlexFabric 12910 TAA-compliant Main Processing Unit
- JH263A HP FlexFabric 12904E Main Processing Unit
- JH255A HP FlexFabric 12908E Switch Chassis
- JH262A HP FlexFabric 12904E Switch Chassis
- JH113A HP FlexFabric 12910 TAA-compliant Switch AC Chassis
- JH103A HP FlexFabric 12916E Switch Chassis
- 5900 (Comware 7) - Version: R2422P02
- HP Network Products
- JC772A HP 5900AF-48XG-4QSFP+ Switch
- JG296A HP 5920AF-24XG Switch
- JG336A HP 5900AF-48XGT-4QSFP+ Switch
- JG510A HP 5900AF-48G-4XG-2QSFP+ Switch
- JG554A HP 5900AF-48XG-4QSFP+ TAA Switch
- JG555A HP 5920AF-24XG TAA Switch
- JG838A HP FF 5900CP-48XG-4QSFP+ Switch
- JH036A HP FlexFabric 5900CP 48XG 4QSFP+ TAA-Compliant
- JH037A HP 5900AF 48XGT 4QSFP+ TAA-Compliant Switch
- JH038A HP 5900AF 48G 4XG 2QSFP+ TAA-Compliant
- MSR1000 (Comware 7) - Version: R0305P08
- HP Network Products
- JG875A HP MSR1002-4 AC Router
- JH060A HP MSR1003-8S AC Router
- MSR2000 (Comware 7) - Version: R0305P08
- HP Network Products
- JG411A HP MSR2003 AC Router
- JG734A HP MSR2004-24 AC Router
- JG735A HP MSR2004-48 Router
- JG866A HP MSR2003 TAA-compliant AC Router
- MSR3000 (Comware 7) - Version: R0305P08
- HP Network Products
- JG404A HP MSR3064 Router
- JG405A HP MSR3044 Router
- JG406A HP MSR3024 AC Router
- JG407A HP MSR3024 DC Router
- JG408A HP MSR3024 PoE Router
- JG409A HP MSR3012 AC Router
- JG410A HP MSR3012 DC Router
- JG861A HP MSR3024 TAA-compliant AC Router
- MSR4000 (Comware 7) - Version: R0305P08
- HP Network Products
- JG402A HP MSR4080 Router Chassis
- JG403A HP MSR4060 Router Chassis
- JG412A HP MSR4000 MPU-100 Main Processing Unit
- JG869A HP MSR4000 TAA-compliant MPU-100 Main Processing Unit
- VSR (Comware 7) - Version: E0322
- HP Network Products
- JG810AAE HP VSR1001 Virtual Services Router 60 Day Evaluation Software
- JG811AAE HP VSR1001 Comware 7 Virtual Services Router
- JG812AAE HP VSR1004 Comware 7 Virtual Services Router
- JG813AAE HP VSR1008 Comware 7 Virtual Services Router
- 7900 (Comware 7) - Version: R2138P03
- HP Network Products
- JG682A HP FlexFabric 7904 Switch Chassis
- JG841A HP FlexFabric 7910 Switch Chassis
- JG842A HP FlexFabric 7910 7.2Tbps Fabric / Main Processing Unit
- JH001A HP FlexFabric 7910 2.4Tbps Fabric / Main Processing Unit
- JH122A HP FlexFabric 7904 TAA-compliant Switch Chassis
- JH123A HP FlexFabric 7910 TAA-compliant Switch Chassis
- JH124A HP FlexFabric 7910 7.2Tbps TAA-compliant Fabric/Main Processing Unit
- JH125A HP FlexFabric 7910 2.4Tbps TAA-compliant Fabric/Main Processing Unit
- 5130 (Comware 7) - Version: R3111P03
- HP Network Products
- JG932A HP 5130-24G-4SFP+ EI Switch
- JG933A HP 5130-24G-SFP-4SFP+ EI Switch
- JG934A HP 5130-48G-4SFP+ EI Switch
- JG936A HP 5130-24G-PoE+-4SFP+ (370W) EI Switch
- JG937A HP 5130-48G-PoE+-4SFP+ (370W) EI Switch
- JG938A HP 5130-24G-2SFP+-2XGT EI Switch
- JG939A HP 5130-48G-2SFP+-2XGT EI Switch
- JG940A HP 5130-24G-PoE+-2SFP+-2XGT (370W) EI Switch
- JG941A HP 5130-48G-PoE+-2SFP+-2XGT (370W) EI Switch
- JG975A HP 5130-24G-4SFP+ EI Brazil Switch
- JG976A HP 5130-48G-4SFP+ EI Brazil Switch
- JG977A HP 5130-24G-PoE+-4SFP+ (370W) EI Brazil Switch
- JG978A HP 5130-48G-PoE+-4SFP+ (370W) EI Brazil Switch
- 5700 (Comware 7) - Version: R2422P02
- HP Network Products
- JG894A HP FlexFabric 5700-48G-4XG-2QSFP+ Switch
- JG895A HP FlexFabric 5700-48G-4XG-2QSFP+ TAA-compliant Switch
- JG896A HP FlexFabric 5700-40XG-2QSFP+ Switch
- JG897A HP FlexFabric 5700-40XG-2QSFP+ TAA-compliant Switch
- JG898A HP FlexFabric 5700-32XGT-8XG-2QSFP+ Switch
- JG899A HP FlexFabric 5700-32XGT-8XG-2QSFP+ TAA-compliant Switch
- 5930 (Comware 7) - Version: R2422P02
- HP Network Products
- JG726A HP FlexFabric 5930 32QSFP+ Switch
- JG727A HP FlexFabric 5930 32QSFP+ TAA-compliant Switch
- JH178A HP FlexFabric 5930 2QSFP+ 2-slot Switch
- JH179A HP FlexFabric 5930 4-slot Switch
- JH187A HP FlexFabric 5930 2QSFP+ 2-slot TAA-compliant Switch
- JH188A HP FlexFabric 5930 4-slot TAA-compliant Switch
- HSR6600 (Comware 7) - Version: R7103P07
- HP Network Products
- JG353A HP HSR6602-G Router
- JG354A HP HSR6602-XG Router
- JG776A HP HSR6602-G TAA-compliant Router
- JG777A HP HSR6602-XG TAA-compliant Router
- HSR6800 (Comware 7) - Version: R7103P07
- HP Network Products
- JG361A HP HSR6802 Router Chassis
- JG361B HP HSR6802 Router Chassis
- JG362A HP HSR6804 Router Chassis
- JG362B HP HSR6804 Router Chassis
- JG363A HP HSR6808 Router Chassis
- JG363B HP HSR6808 Router Chassis
- JG364A HP HSR6800 RSE-X2 Router Main Processing Unit
- JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing
- JH075A HP HSR6800 RSE-X3 Router Main Processing Unit
- 1950 (Comware 7) - Version: R3111P03
- HP Network Products
- JG960A HP 1950-24G-4XG Switch
- JG961A HP 1950-48G-2SFP+-2XGT Switch
- JG962A HP 1950-24G-2SFP+-2XGT-PoE+(370W) Switch
- JG963A HP 1950-48G-2SFP+-2XGT-PoE+(370W) Switch
- 7500 (Comware 7) - Version: R7178
- HP Network Products
- JD238C HP 7510 Switch Chassis
- JD239C HP 7506 Switch Chassis
- JD240C HP 7503 Switch Chassis
- JD242C HP 7502 Switch Chassis
- JH207A HP 7500 1.2Tbps Fabric with 2-port 40GbE QSFP+ for IRF-Only Main Processing Unit
- JH208A HP 7502 Main Processing Unit
- JH209A HP 7500 2.4Tbps Fabric with 8-port 1/10GbE SFP+ and 2-port 40GbE QSFP+ Main Processing Unit
- 5130HI - Version: R1118P02
- HP Network Products
- JH323A HPE 5130 24G 4SFP+ 1-slot HI Switch
- JH324A HPE 5130 48G 4SFP+ 1-slot HI Switch
- JH325A HPE 5130 24G PoE+ 4SFP+ 1-slot HI Switch
- JH326A HPE 5130 48G PoE+ 4SFP+ 1-slot HI Switch
- 5510HI - Version: R1118P02
- HP Network Products
- JH145A HPE 5510 24G 4SFP+ HI 1-slot Switch
- JH146A HPE 5510 48G 4SFP+ HI 1-slot Switch
- JH147A HPE 5510 24G PoE+ 4SFP+ HI 1-slot Switch
- JH148A HPE 5510 48G PoE+ 4SFP+ HI 1-slot Switch
- JH149A HPE 5510 24G SFP 4SFP+ HI 1-slot Switch
Note: Please contact HPE Technical Support if any assistance is needed acquiring the software updates.
HISTORY Version:1 (rev.1) - 21 September 2016 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com.
Report: To report a potential security vulnerability for any HPE supported product: Web form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com
Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HPE General Software HF = HPE Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX
Copyright 2016 Hewlett Packard Enterprise
Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise and the names of Hewlett Packard Enterprise products referenced herein are trademarks of Hewlett Packard Enterprise in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
============================================================================= FreeBSD-SA-15:25.ntp Security Advisory The FreeBSD Project
Topic: Multiple vulnerabilities of ntp
Category: contrib Module: ntp Announced: 2015-10-26 Credits: Network Time Foundation Affects: All supported versions of FreeBSD. Corrected: 2015-10-26 11:35:40 UTC (stable/10, 10.2-STABLE) 2015-10-26 11:36:55 UTC (releng/10.2, 10.2-RELEASE-p6) 2015-10-26 11:37:31 UTC (releng/10.1, 10.1-RELEASE-p23) 2015-10-26 11:36:40 UTC (stable/9, 9.3-STABLE) 2015-10-26 11:42:25 UTC (releng/9.3, 9.3-RELEASE-p29) CVE Name: CVE-2015-7701, CVE-2015-7702, CVE-2015-7703, CVE-2015-7704, CVE-2015-7848, CVE-2015-7849, CVE-2015-7850, CVE-2015-7851, CVE-2015-7852, CVE-2015-7853, CVE-2015-7854, CVE-2015-7855, CVE-2015-7871
For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit https://security.FreeBSD.org/.
I.
II. Problem Description
Crypto-NAK packets can be used to cause ntpd(8) to accept time from an unauthenticated ephemeral symmetric peer by bypassing the authentication required to mobilize peer associations. [CVE-2015-7871] FreeBSD 9.3 and 10.1 are not affected.
If ntpd(8) is fed a crafted mode 6 or mode 7 packet containing an unusual long data value where a network address is expected, the decodenetnum() function will abort with an assertion failure instead of simply returning a failure condition. [CVE-2015-7855]
If ntpd(8) is configured to allow remote configuration, and if the (possibly spoofed) source IP address is allowed to send remote configuration requests, and if the attacker knows the remote configuration password or if ntpd(8) was configured to disable authentication, then an attacker can send a set of packets to ntpd(8) that may cause it to crash, with the hypothetical possibility of a small code injection. [CVE-2015-7854]
A negative value for the datalen parameter will overflow a data buffer. NTF's ntpd(8) driver implementations always set this value to 0 and are therefore not vulnerable to this weakness. If you are running a custom refclock driver in ntpd(8) and that driver supplies a negative value for datalen (no custom driver of even minimal competence would do this) then ntpd would overflow a data buffer. It is even hypothetically possible in this case that instead of simply crashing ntpd the attacker could effect a code injection attack. [CVE-2015-7853]
If an attacker can figure out the precise moment that ntpq(8) is listening for data and the port number it is listening on or if the attacker can provide a malicious instance ntpd(8) that victims will connect to then an attacker can send a set of crafted mode 6 response packets that, if received by ntpq(8), can cause ntpq(8) to crash. [CVE-2015-7852]
If ntpd(8) is configured to allow remote configuration, and if the (possibly spoofed) IP address is allowed to send remote configuration requests, and if the attacker knows the remote configuration password or if ntpd(8) was configured to disable authentication, then an attacker can send a set of packets to ntpd that may cause ntpd(8) to overwrite files. [CVE-2015-7851]. The default configuration of ntpd(8) within FreeBSD does not allow remote configuration.
If ntpd(8) is configured to allow remote configuration, and if the (possibly spoofed) source IP address is allowed to send remote configuration requests, and if the attacker knows the remote configuration password or if ntpd(8) was configured to disable authentication, then an attacker can send a set of packets to ntpd that will cause it to crash and/or create a potentially huge log file. Specifically, the attacker could enable extended logging, point the key file at the log file, and cause what amounts to an infinite loop. [CVE-2015-7850]. The default configuration of ntpd(8) within FreeBSD does not allow remote configuration.
If ntpd(8) is configured to allow remote configuration, and if the (possibly spoofed) source IP address is allowed to send remote configuration requests, and if the attacker knows the remote configuration password or if ntpd was configured to disable authentication, then an attacker can send a set of packets to ntpd that may cause a crash or theoretically perform a code injection attack. [CVE-2015-7849]. The default configuration of ntpd(8) within FreeBSD does not allow remote configuration.
If ntpd(8) is configured to enable mode 7 packets, and if the use of mode 7 packets is not properly protected thru the use of the available mode 7 authentication and restriction mechanisms, and if the (possibly spoofed) source IP address is allowed to send mode 7 queries, then an attacker can send a crafted packet to ntpd that will cause it to crash. [CVE-2015-7848]. The default configuration of ntpd(8) within FreeBSD does not allow mode 7 packets.
If ntpd(8) is configured to use autokey, then an attacker can send packets to ntpd that will, after several days of ongoing attack, cause it to run out of memory. [CVE-2015-7701]. The default configuration of ntpd(8) within FreeBSD does not use autokey.
If ntpd(8) is configured to allow for remote configuration, and if the (possibly spoofed) source IP address is allowed to send remote configuration requests, and if the attacker knows the remote configuration password, it's possible for an attacker to use the "pidfile" or "driftfile" directives to potentially overwrite other files. [CVE-2015-5196]. The default configuration of ntpd(8) within FreeBSD does not allow remote configuration
An ntpd(8) client that honors Kiss-of-Death responses will honor KoD messages that have been forged by an attacker, causing it to delay or stop querying its servers for time updates. Also, an attacker can forge packets that claim to be from the target and send them to servers often enough that a server that implements KoD rate limiting will send the target machine a KoD response to attempt to reduce the rate of incoming packets, or it may also trigger a firewall block at the server for packets from the target machine. For either of these attacks to succeed, the attacker must know what servers the target is communicating with. An attacker can be anywhere on the Internet and can frequently learn the identity of the target's time source by sending the target a time query. [CVE-2015-7704]
The fix for CVE-2014-9750 was incomplete in that there were certain code paths where a packet with particular autokey operations that contained malicious data was not always being completely validated. Receipt of these packets can cause ntpd to crash. [CVE-2015-7702]. The default configuration of ntpd(8) within FreeBSD does not use autokey.
III. Impact
An attacker which can send NTP packets to ntpd(8), which uses cryptographic authentication of NTP data, may be able to inject malicious time data causing the system clock to be set incorrectly. [CVE-2015-7871]
An attacker which can send NTP packets to ntpd(8), can block the communication of the daemon with time servers, causing the system clock not being synchronized. [CVE-2015-7704]
An attacker which can send NTP packets to ntpd(8), can remotely crash the daemon, sending malicious data packet. [CVE-2015-7855] [CVE-2015-7854] [CVE-2015-7853] [CVE-2015-7852] [CVE-2015-7849] [CVE-2015-7848]
An attacker which can send NTP packets to ntpd(8), can remotely trigger the daemon to overwrite its configuration files. [CVE-2015-7851] [CVE-2015-5196]
IV. Workaround
No workaround is available, but systems not running ntpd(8) are not affected. Network administrators are advised to implement BCP-38, which helps to reduce risk associated with the attacks.
V. Solution
Perform one of the following:
1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date.
The ntpd service has to be restarted after the update. A reboot is recommended but not required.
2) To update your vulnerable system via a binary patch:
Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility:
freebsd-update fetch
freebsd-update install
The ntpd service has to be restarted after the update. A reboot is recommended but not required.
3) To update your vulnerable system via a source code patch:
The following patches have been verified to apply to the applicable FreeBSD release branches.
a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.
[FreeBSD 10.2]
fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-102.patch.bz2
bunzip2 ntp-102.patch.bz2
fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-102.patch.asc
gpg --verify ntp-102.patch.asc
[FreeBSD 10.1]
fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-101.patch.bz2
bunzip2 ntp-101.patch.bz2
fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-101.patch.asc
gpg --verify ntp-101.patch.asc
[FreeBSD 9.3]
fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-93.patch.bz2
bunzip2 ntp-93.patch.bz2
fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-93.patch.asc
gpg --verify ntp-93.patch.asc
b) Apply the patch. Execute the following commands as root:
cd /usr/src
patch < /path/to/patch
find contrib/ntp -type f -empty -delete
c) Recompile the operating system using buildworld and installworld as described in https://www.FreeBSD.org/handbook/makeworld.html.
d) For 9.3-RELEASE and 10.1-RELEASE an update to /etc/ntp.conf is recommended, which can be done with help of the mergemaster(8) tool on 9.3-RELEASE and with help of the etcupdate(8) tool on 10.1-RELEASE.
Restart the ntpd(8) daemon, or reboot the system.
VI. Correction details
The following list contains the correction revision numbers for each affected branch.
Branch/path Revision
stable/9/ r289998 releng/9.3/ r290001 stable/10/ r289997 releng/10.1/ r290000 releng/10.2/ r289999
To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed:
svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
Or visit the following URL, replacing NNNNNN with the revision number:
https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN
VII. References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7848 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7849 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7853 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7854 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871
The latest revision of this advisory is available at https://security.FreeBSD.org/advisories/FreeBSD-SA-15:25.ntp.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIcBAEBAgAGBQJWLhOJAAoJEO1n7NZdz2rn91wP/2GwEt1boNQq2a7nYzv/mS5D sYKkIi7o+2yr2BLXvtc3O7c9QC3/YeGsza9DTRqndcY572SWvRgtkFstMTTm8IV/ RVlIE40gVR3tex0zo7BiD7uKUrxWxWcpwMbE5dzlE+vSybyyj0dSSkwUHJjrbJoA RmyNuEEUhQn5sRCg6qJv/PLp2G7BcYAasKScukjm7QnLP2kq/tvM9mcqwfh2tadM 7kbf8uq+ykvsRzctaDnxQaB5+zJxBQYJjBelxQfIkNek0XGfdj3sRwISeFznbllq mOLTIBaFiuEtHtusO7MKKavMgS5CQJOvuuvd/l3NY1MnxC6X/1SWig9KIKDIn/hv q8dsnq7LLx+tO6Cv4Dub7EbC2ZP3xXGOC4Ie02z8bTZnbX7iwyPUidQQqtU9ra15 rxzFcZnBxu+yyMNJVsV2qVV/r9OycgKxWlEELC1wYrK9fKfvLdA5aEGjDeU1Z+s6 JS2zKr0t4F2bMrCsjYP1lQD8sHkCVjwJk+IJU/slcwSajDjBNlMH0yBxGYE1ETIZ qMF7/PAkLe8V78pdYmXw9pcaPyhI+ihPLnNrdhX8AI2RX5jDK7IuUNJeUM04UrVB 8N+mMwgamcuCPWNNyXaL0bz21fexZOuhHmU+B8Yn3SFX5O5b/r9gGvrjo8ei8jOk EUlBT3ViDhHNrI7PTaiI =djPm -----END PGP SIGNATURE----- . ============================================================================ Ubuntu Security Notice USN-2783-1 October 27, 2015
ntp vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.10
- Ubuntu 15.04
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in NTP. (CVE-2015-5146)
Miroslav Lichvar discovered that NTP incorrectly handled logconfig directives. (CVE-2015-5194)
Miroslav Lichvar discovered that NTP incorrectly handled certain statistics types. (CVE-2015-5195)
Miroslav Lichvar discovered that NTP incorrectly handled certain file paths. Cohen, and Sharon Goldberg discovered that NTP incorrectly handled restarting after hitting a panic threshold. (CVE-2015-7691, CVE-2015-7692, CVE-2015-7702)
It was discovered that NTP incorrectly handled memory when processing certain autokey messages. Cohen, and Sharon Goldberg discovered that NTP incorrectly handled rate limiting. A remote attacker could possibly use this issue to cause clients to stop updating their clock. (CVE-2015-7704, CVE-2015-7705)
Yves Younan discovered that NTP incorrectly handled logfile and keyfile directives. (CVE-2015-7850)
Yves Younan and Aleksander Nikolich discovered that NTP incorrectly handled ascii conversion. (CVE-2015-7852)
Yves Younan discovered that NTP incorrectly handled reference clock memory. A malicious refclock could possibly use this issue to cause NTP to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2015-7853)
John D "Doug" Birdwell discovered that NTP incorrectly handled decoding certain bogus values. (CVE-2015-7855)
Stephen Gray discovered that NTP incorrectly handled symmetric association authentication. (CVE-2015-7871)
In the default installation, attackers would be isolated by the NTP AppArmor profile.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 15.10: ntp 1:4.2.6.p5+dfsg-3ubuntu8.1
Ubuntu 15.04: ntp 1:4.2.6.p5+dfsg-3ubuntu6.2
Ubuntu 14.04 LTS: ntp 1:4.2.6.p5+dfsg-3ubuntu2.14.04.5
Ubuntu 12.04 LTS: ntp 1:4.2.6.p3+dfsg-1ubuntu3.6
In general, a standard system update will make all the necessary changes.
On October 21st, 2015, NTP.org released a security advisory detailing 13 issues regarding multiple DoS vulnerabilities, information disclosure vulnerabilities, and logic issues that may result in an attacker gaining the ability to modify an NTP server's advertised time.
Workarounds that mitigate one or more of the vulnerabilities may be available for certain products, please see the individual Cisco Bug IDs for details.
CVE-2015-5194
It was found that ntpd could crash due to an uninitialized
variable when processing malformed logconfig configuration
commands.
CVE-2015-5195
It was found that ntpd exits with a segmentation fault when a
statistics type that was not enabled during compilation (e.g.
timingstats) is referenced by the statistics or filegen
configuration command
CVE-2015-5219
It was discovered that sntp program would hang in an infinite loop
when a crafted NTP packet was received, related to the conversion
of the precision value in the packet to double. If the threshold is exceeded
after that, ntpd will exit with a message to the system log. This
option can be used with the -q and -x options.
ntpd could actually step the clock multiple times by more than the
panic threshold if its clock discipline doesn't have enough time to
reach the sync state and stay there for at least one update.
This is contrary to what the documentation says. Normally, the
assumption is that an MITM attacker can step the clock more than the
panic threshold only once when ntpd starts and to make a larger
adjustment the attacker has to divide it into multiple smaller
steps, each taking 15 minutes, which is slow.
CVE-2015-7701
A memory leak flaw was found in ntpd's CRYPTO_ASSOC.
CVE-2015-7703
Miroslav Lichvar of Red Hat found that the :config command can be
used to set the pidfile and driftfile paths without any
restrictions. A remote attacker could use this flaw to overwrite a
file on the file system with a file containing the pid of the ntpd
process (immediately) or the current estimated drift of the system
clock (in hourly intervals). For example:
ntpq -c ':config pidfile /tmp/ntp.pid'
ntpq -c ':config driftfile /tmp/ntp.drift'
In Debian ntpd is configured to drop root privileges, which limits
the impact of this issue.
CVE-2015-7704
If ntpd as an NTP client receives a Kiss-of-Death (KoD) packet
from the server to reduce its polling rate, it doesn't check if the
originate timestamp in the reply matches the transmit timestamp from
its request. A
specially crafted configuration file could cause an endless loop
resulting in a denial of service.
CVE-2015-7852
A potential off by one vulnerability exists in the cookedprint
functionality of ntpq. A specially crafted buffer could cause a
buffer overflow potentially resulting in null byte being written out
of bounds.
CVE-2015-7871
An error handling logic error exists within ntpd that manifests due
to improper error condition handling associated with certain
crypto-NAK packets. An unauthenticated, off-path attacker can force
ntpd processes on targeted servers to peer with time sources of the
attacker's choosing by transmitting symmetric active crypto-NAK
packets to ntpd.
For the oldstable distribution (wheezy), these problems have been fixed in version 1:4.2.6.p5+dfsg-2+deb7u6.
For the stable distribution (jessie), these problems have been fixed in version 1:4.2.6.p5+dfsg-7+deb8u1.
For the testing distribution (stretch), these problems have been fixed in version 1:4.2.8p4+dfsg-3.
For the unstable distribution (sid), these problems have been fixed in version 1:4.2.8p4+dfsg-3.
We recommend that you upgrade your ntp packages.
Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/ntp-4.2.8p4-i486-1_slack14.1.txz: Upgraded. In addition to bug fixes and enhancements, this release fixes several low and medium severity vulnerabilities. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9750 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5196 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7705 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7848 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7849 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7853 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7854 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871 ( Security fix ) +--------------------------+
Where to find the new packages: +-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.
Updated package for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/ntp-4.2.8p4-i486-1_slack13.0.txz
Updated package for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/ntp-4.2.8p4-x86_64-1_slack13.0.txz
Updated package for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/ntp-4.2.8p4-i486-1_slack13.1.txz
Updated package for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/ntp-4.2.8p4-x86_64-1_slack13.1.txz
Updated package for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/ntp-4.2.8p4-i486-1_slack13.37.txz
Updated package for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/ntp-4.2.8p4-x86_64-1_slack13.37.txz
Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/ntp-4.2.8p4-i486-1_slack14.0.txz
Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/ntp-4.2.8p4-x86_64-1_slack14.0.txz
Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/ntp-4.2.8p4-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/ntp-4.2.8p4-x86_64-1_slack14.1.txz
Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/ntp-4.2.8p4-i586-1.txz
Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/ntp-4.2.8p4-x86_64-1.txz
MD5 signatures: +-------------+
Slackware 13.0 package: 21dd14178fea17a88c9326c8672ecefd ntp-4.2.8p4-i486-1_slack13.0.txz
Slackware x86_64 13.0 package: 8647479b2007b92ff8598184f2275263 ntp-4.2.8p4-x86_64-1_slack13.0.txz
Slackware 13.1 package: e0f122e8e271dc84db06202c03cc0288 ntp-4.2.8p4-i486-1_slack13.1.txz
Slackware x86_64 13.1 package: db0aff04b72b3d8c96ca8c8e1ed36c05 ntp-4.2.8p4-x86_64-1_slack13.1.txz
Slackware 13.37 package: 5914e43e886e5ff88fefd30083493e30 ntp-4.2.8p4-i486-1_slack13.37.txz
Slackware x86_64 13.37 package: 4335c3bf2ae24afc5ad734e8d80b3e94 ntp-4.2.8p4-x86_64-1_slack13.37.txz
Slackware 14.0 package: 39b05698797b638b67130e0b170e0a4b ntp-4.2.8p4-i486-1_slack14.0.txz
Slackware x86_64 14.0 package: dcf4a56ba1d013ee1c9d0e624e158709 ntp-4.2.8p4-x86_64-1_slack14.0.txz
Slackware 14.1 package: 1fd3a7beaf23303e2c211af377662614 ntp-4.2.8p4-i486-1_slack14.1.txz
Slackware x86_64 14.1 package: 438c3185aa8ec20d1c2b5e51786e4d41 ntp-4.2.8p4-x86_64-1_slack14.1.txz
Slackware -current package: 81bfb2fed450cb26a51b5e1cee0d33ed n/ntp-4.2.8p4-i586-1.txz
Slackware x86_64 -current package: 8bae4ad633af40d4d54b7686e4b225f9 n/ntp-4.2.8p4-x86_64-1.txz
Installation instructions: +------------------------+
Upgrade the package as root:
upgradepkg ntp-4.2.8p4-i486-1_slack14.1.txz
Then, restart the NTP daemon:
sh /etc/rc.d/rc.ntpd restart
+-----+
Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com
+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201708-1547", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ntp", "scope": "eq", "trust": 1.3, "vendor": "ntp", "version": "4.2.8" }, { "model": "xenserver", "scope": "eq", "trust": 1.3, "vendor": "citrix", "version": "6.0.2" }, { "model": "xenserver", "scope": "eq", "trust": 1.3, "vendor": "citrix", "version": "7.0" }, { "model": "xenserver", "scope": "eq", "trust": 1.3, "vendor": "citrix", "version": "6.5" }, { "model": "ntp", "scope": "eq", "trust": 1.1, "vendor": "ntp", "version": "4.3.77" }, { "model": "ntp", "scope": "gte", "trust": 1.0, "vendor": "ntp", "version": "4.3.0" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.6" }, { "model": "ntp", "scope": "lt", "trust": 1.0, "vendor": "ntp", "version": "4.2.8" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.5" }, { "model": "oncommand performance manager", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "oncommand unified manager", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.6" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "data ontap", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.4" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "8.0" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.5" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.7" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.7" }, { "model": "clustered data ontap", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.6" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.3" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "ntp", "scope": "lt", "trust": 1.0, "vendor": "ntp", "version": "4.3.77" }, { "model": "enterprise security manager", "scope": "lt", "trust": 1.0, "vendor": "mcafee", "version": "11.2.0" }, { "model": "ntp", "scope": "gte", "trust": 1.0, "vendor": "ntp", "version": "4.2.0" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.6" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.1" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "7.0" }, { "model": "enterprise security manager", "scope": "gte", "trust": 1.0, "vendor": "mcafee", "version": "11.0.0" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.6" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.4" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.7" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.5" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.6" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.3" }, { "model": "xenserver", "scope": "eq", "trust": 1.0, "vendor": "citrix", "version": "6.2.0" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "enterprise linux server eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.5" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.7" }, { "model": "enterprise security manager", "scope": "lt", "trust": 1.0, "vendor": "mcafee", "version": "10.4.0" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.3" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "ntp", "scope": "eq", "trust": 0.9, "vendor": "ntp", "version": "4.3.70" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ntp", "version": null }, { "model": "ntp", "scope": "lt", "trust": 0.8, "vendor": "ntp", "version": "4.3.x" }, { "model": "ntp", "scope": "eq", "trust": 0.8, "vendor": "ntp", "version": "4.2.8p4" }, { "model": "ntp", "scope": "lt", "trust": 0.8, "vendor": "ntp", "version": "4.x" }, { "model": "web gateway", "scope": "eq", "trust": 0.6, "vendor": "mcafee", "version": "7.6.2.0" }, { "model": "web gateway", "scope": "eq", "trust": 0.6, "vendor": "mcafee", "version": "7.3.28" }, { "model": "web gateway", "scope": "ne", "trust": 0.6, "vendor": "mcafee", "version": "7.5.2.9" }, { "model": "web gateway", "scope": "eq", "trust": 0.6, "vendor": "mcafee", "version": "7.3.2.9." }, { "model": "web gateway", "scope": "eq", "trust": 0.6, "vendor": "mcafee", "version": "7.3.2.4" }, { "model": "web gateway", "scope": "ne", "trust": 0.6, "vendor": "mcafee", "version": "7.6.2.1" }, { "model": "web gateway", "scope": "eq", "trust": 0.6, "vendor": "mcafee", "version": "7.3.2.9" }, { "model": "web gateway", "scope": "eq", "trust": 0.6, "vendor": "mcafee", "version": "7.5.2.8" }, { "model": "web gateway", "scope": "eq", "trust": 0.6, "vendor": "mcafee", "version": "7.4.2.1" }, { "model": "web gateway", "scope": "eq", "trust": 0.6, "vendor": "mcafee", "version": "7.3.2" }, { "model": "web gateway", "scope": "eq", "trust": 0.6, "vendor": "mcafee", "version": "7.4.0" }, { "model": "web gateway", "scope": "eq", "trust": 0.6, "vendor": "mcafee", "version": "7.1.5.1" }, { "model": "web gateway", "scope": "eq", "trust": 0.6, "vendor": "mcafee", "version": "7.3.2.10" }, { "model": "web gateway", "scope": "eq", "trust": 0.6, "vendor": "mcafee", "version": "7.4.2" }, { "model": "web gateway", "scope": "eq", "trust": 0.6, "vendor": "mcafee", "version": "7.2.0.9" }, { "model": "web gateway", "scope": "eq", "trust": 0.6, "vendor": "mcafee", "version": "7.3.2.6" }, { "model": "web gateway", "scope": "eq", "trust": 0.6, "vendor": "mcafee", "version": "7.1.5.2" }, { "model": "web gateway", "scope": "eq", "trust": 0.6, "vendor": "mcafee", "version": "7.4.1" }, { "model": "web gateway", "scope": "eq", "trust": 0.6, "vendor": "mcafee", "version": "7.4.13" }, { "model": "web gateway", "scope": "eq", "trust": 0.6, "vendor": "mcafee", "version": "7.0.0" }, { "model": "web gateway", "scope": "eq", "trust": 0.6, "vendor": "mcafee", "version": "7.3.2.2" }, { "model": "ntp", "scope": "eq", "trust": 0.6, "vendor": "ntp", "version": "4.3.67" }, { "model": "ntp", "scope": "eq", "trust": 0.6, "vendor": "ntp", "version": "4.3.74" }, { "model": "ntp", "scope": "eq", "trust": 0.6, "vendor": "ntp", "version": "4.3.68" }, { "model": "ntp", "scope": "eq", "trust": 0.6, "vendor": "ntp", "version": "4.3.69" }, { "model": "ntp", "scope": "eq", "trust": 0.6, "vendor": "ntp", "version": "4.3.72" }, { "model": "ntp", "scope": "eq", "trust": 0.6, "vendor": "ntp", "version": "4.3.73" }, { "model": "ntp", "scope": "eq", "trust": 0.6, "vendor": "ntp", "version": "4.3.75" }, { "model": "ntp", "scope": "eq", "trust": 0.6, "vendor": "ntp", "version": "4.3.76" }, { "model": "ntp", "scope": "eq", "trust": 0.6, "vendor": "ntp", "version": "4.3.71" }, { "model": "taa switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10508-v0" }, { "model": "switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "105080" }, { "model": "10.2-rc1-p2", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3.0.0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "taa switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "105080" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.211" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "nexus series switches", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "90000" }, { "model": "qlogic virtual fabric extension module for ibm bladecenter", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.0.3.14.0" }, { "model": "extremexos", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "21.1" }, { "model": "flexfabric 7.2tbps taa-compliant fabric/main processing uni", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "79100" }, { "model": "flexfabric 2qsfp+ 2-slot switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "59300" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.5" }, { "model": "1950-24g-2sfp+-2xgt-poe+ switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.1" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "hsr6800 rse-x3 router main processing unit", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "24g 4sfp+ hi 1-slot switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "55100" }, { "model": "powerkvm", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "smartcloud entry appliance fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.24" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4.0.0" }, { "model": "edge digital media player", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3400" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "small business series wireless access points", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3210" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.3" }, { "model": "48g 4sfp+ 1-slot hi switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "51300" }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "15.7.4" }, { "model": "jabber guest", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10.0(2)" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.219" }, { "model": "10.1-release-p5", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "smartcloud entry appliance fi", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.4" }, { "model": "5130-24g-4sfp+ ei brazil switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.2" }, { "model": "real-time compression appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.2" }, { "model": "prime license manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "visual quality experience server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "9.3-release-p22", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "ff 12508e dc switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "10.1-rc1-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.22" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.4.0" }, { "model": "5130-48g-poe+-4sfp+ ei brazil switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "prime collaboration assurance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "hsr6602-xg taa-compliant router", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "flexfabric 12904e switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "9.3-release-p10", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.3-release-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "extremexos patch", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "15.7.38" }, { "model": "1950-48g-2sfp+-2xgt switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "mpu w/comware os", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "12500v70" }, { "model": "prime infrastructure standalone plug and play gateway", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ff 12518e dc switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "5130-24g-poe+-4sfp+ ei brazil switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "qlogic 8gb intelligent pass-thru module and san switch module", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.10.1.37.00" }, { "model": "dc switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "125040" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.4" }, { "model": "ruggedcom rox", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "1.0" }, { "model": "flexfabric 2.4tbps fabric main processing unit", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7910/0" }, { "model": "4.2.8p3", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "prime access registrar appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "scos", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "flexfabric taa-compliant switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "79100" }, { "model": "10.1-release-p17", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "msr2003 taa-compliant ac router", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "10.1-releng", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "smartcloud entry appliance fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.44" }, { "model": "ntp", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.6" }, { "model": "main processing unit", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "125000" }, { "model": "msr2004-48 router", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "flexfabric 5700-32xgt-8xg-2qsfp+ taa-compliant switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "5900af-48xg-4qsfp+ taa switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "clean access manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "xenserver common criteria", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "6.0.2" }, { "model": "common services platform collector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ac switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "125080" }, { "model": "9.3-beta3-p2", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "media experience engines", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "wap371 wireless access point", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.2" }, { "model": "flexfabric 12916e switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "p1", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.2" }, { "model": "flexfabric 5700-48g-4xg-2qsfp+ switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "10.1-rc2-p3", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "enterprise linux server eus 6.7.z", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "10.1-release-p23", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "xenserver sp1", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "6.2.0" }, { "model": "mediasense", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "flexfabric 7.2tbps fabric main processing unit", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7910/0" }, { "model": "hsr6808 router chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.42" }, { "model": "hsr6800 rse-x2 router taa-compliant main processing", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "msr1003-8s ac router", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "5130-24g-sfp-4sfp+ ei switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "flexfabric 12900e main processing unit", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "show and share", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "sentinel", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ucs director", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "msr4060 router chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "ff 12500e mpu", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "ruggedcom rox", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "1.14.5" }, { "model": "telepresence isdn link", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "1950-24g-4xg switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "48g poe+ 4sfp+ 1-slot hi switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "51300" }, { "model": "physical access manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "flexfabric 32qsfp+ switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "59300" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "powerkvm", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "ac switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "125180" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.08" }, { "model": "5130-48g-poe+-2sfp+-2xgt ei switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "msr4000 mpu-100 main processing unit", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "communications session border controller", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7.2.0" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.0.4" }, { "model": "nac guest server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "enterprise content delivery system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.1" }, { "model": "vsr1001 comware virtual services router", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "70" }, { "model": "9.3-rc", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "flexfabric 12904e main processing unit", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "9.3-beta1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.08" }, { "model": "5130-24g-4sfp+ ei switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "10.2-rc2-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "ff 12508e ac switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.0.3" }, { "model": "10.1-rc2-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "video delivery system recorder", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "msr4080 router chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.213" }, { "model": "10.1-release", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "communications session border controller", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7.3.0" }, { "model": "websphere datapower xc10 appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.5" }, { "model": "msr3044 router", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "5130-48g-4sfp+ ei brazil switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "4.2.5p186", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "9.3-release-p2", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "smartcloud entry appliance fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.22" }, { "model": "9.3-stable", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-release-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "digital media manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.1" }, { "model": "msr3064 router", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "48g poe+ 4sfp+ hi 1-slot switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "55100" }, { "model": "10.1-release-p9", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "netsight appliance", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "6.0" }, { "model": "4.2.5p3", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "msr2004-24 ac router", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "flexfabric 32qsfp+ taa-compliant switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "59300" }, { "model": "smartcloud entry appliance fixpac", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.1" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.2" }, { "model": "automation stratix", "scope": "ne", "trust": 0.3, "vendor": "rockwell", "version": "590015.6.3" }, { "model": "9.3-rc2-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "flex system fc3171 8gb san switch and san pass-thru", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.0.00" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.1" }, { "model": "smartcloud entry appliance fix pack", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "2.46" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.5" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.3" }, { "model": "unity express", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry appliance fix pack", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "2.26" }, { "model": "10.2-rc1-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "flexfabric 2qsfp+ 2-slot taa-compliant switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "59300" }, { "model": "switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "75030" }, { "model": "switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "75060" }, { "model": "4.2.8p5", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "hsr6602-g taa-compliant router", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "netsight appliance", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "6.3" }, { "model": "telepresence exchange system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "5130-24g-poe+-2sfp+-2xgt ei switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7" }, { "model": "flexfabric main processing unit", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "119000" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.4" }, { "model": "10.1-beta1-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "automation stratix", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "59000" }, { "model": "9.3-release-p3", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.32" }, { "model": "5130-24g-poe+-4sfp+ ei switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.3" }, { "model": "switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "75020" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.2" }, { "model": "msr3024 taa-compliant ac router", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "hosted collaboration mediation fulfillment", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.0" }, { "model": "smartcloud entry appliance fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.34" }, { "model": "5900af 48g 4xg 2qsfp+ taa-compliant", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "flexfabric switch ac chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "129160" }, { "model": "10.1-stable", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "type a mpu w/comware os", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10500v70" }, { "model": "dc switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "125080" }, { "model": "5900af-48xgt-4qsfp+ switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "intrusion prevention system solutions", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "prime access registrar", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "onepk all-in-one vm", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "xenserver sp1", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "6.5" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.0" }, { "model": "msr3024 dc router", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "flexfabric switch ac chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "129100" }, { "model": "9.3-beta1-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.3-release-p25", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "summit wm3000 series", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "0" }, { "model": "hsr6800 rse-x2 router main processing unit", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.1" }, { "model": "series ip phones vpn feature", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8800-0" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.21" }, { "model": "small business series wireless access points", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1210" }, { "model": "msr3012 dc router", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "5130-48g-poe+-4sfp+ ei switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "industrial router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9100" }, { "model": "10.2-beta2-p2", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "vsr1008 comware virtual services router", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "70" }, { "model": "smartcloud entry fixpack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.0.33" }, { "model": "type d taa-compliant with comware os main processing un", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10500v70" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.2" }, { "model": "video distribution suite for internet streaming", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.31" }, { "model": "4.2.8p7", "scope": "ne", "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.218" }, { "model": "flexfabric taa-compliant switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "79040" }, { "model": "websphere datapower xc10 appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "vsr1004 comware virtual services router", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "70" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.20" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "24g poe+ 4sfp+ 1-slot hi switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "51300" }, { "model": "p4", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.4" }, { "model": "ruggedcom rox", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "2.9.0" }, { "model": "linux x86 64 -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "10.1-beta3-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "10.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.0" }, { "model": "netsight appliance", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "6.4" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.3" }, { "model": "dcm series 9900-digital content manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "9.3" }, { "model": "flexfabric switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "79100" }, { "model": "10.1-rc3-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.0" }, { "model": "dc switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "125180" }, { "model": "hsr6802 router chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "hsr6602-xg router", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "15.7" }, { "model": "switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "75100" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.214" }, { "model": "flexfabric 5700-32xgt-8xg-2qsfp+ switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "9.3-prerelease", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.3-release-p21", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "flexfabric 4-slot taa-compliant switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "59300" }, { "model": "smartcloud entry fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.19" }, { "model": "9.3-release-p24", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "extremexos", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "16.2" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.4" }, { "model": "10.1-release-p19", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "hsr6804 router chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "15.4.1.0" }, { "model": "ac switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "125040" }, { "model": "ruggedcom rox", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "2.6.2" }, { "model": "smartcloud entry appliance fixpac", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2" }, { "model": "5900af-48g-4xg-2qsfp+ switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "9.3-release-p13", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-prerelease", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "msr3024 ac router", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "purview appliance", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "6.0" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.113" }, { "model": "ff 5900cp-48xg-4qsfp+ switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "network device security assessment", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.0.4" }, { "model": "24g 4sfp+ 1-slot hi switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "51300" }, { "model": "smartcloud entry appliance fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.11" }, { "model": "asa cx and cisco prime security manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "5920af-24xg switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "flexfabric 4-slot switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "59300" }, { "model": "nac appliance", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "6.0" }, { "model": "flexfabric 5700-40xg-2qsfp+ taa-compliant switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "msr2003 ac router", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "msr4000 taa-compliant mpu-100 main processing unit", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "ruggedcom rox", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "1.16" }, { "model": "9.3-release-p29", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.110" }, { "model": "standalone rack server cimc", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.2.0.0" }, { "model": "flexfabric main processing unit", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "129160" }, { "model": "9.3-rc2", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "purview appliance", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "6.3" }, { "model": "9.3-rc3-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.37" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "10.2" }, { "model": "flexfabric main processing unit", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "129100" }, { "model": "smartcloud entry appliance fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.21" }, { "model": "smartcloud entry appliance fix pack", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "2.36" }, { "model": "telepresence video communication server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "nac appliance", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "6.3" }, { "model": "switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "125080" }, { "model": "telepresence sx series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "9.3-rc1-p2", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.1-rc4-p1", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "meetingplace", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "48g 4sfp+ hi 1-slot switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "55100" }, { "model": "security guardium", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.0.3" }, { "model": "unified computing system e-series blade server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.0" }, { "model": "ntp", "scope": "ne", "trust": 0.3, "vendor": "ntp", "version": "4.3.92" }, { "model": "flexfabric taa-compliant main processing unit", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "129100" }, { "model": "p74", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.5" }, { "model": "expressway series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.4" }, { "model": "flexfabric 5700-48g-4xg-2qsfp+ taa-compliant switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "5900af 48xgt 4qsfp+ taa-compliant switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "4.2.8p2", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "10.1-release-p6", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "edge digital media player", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3000" }, { "model": "extremexos patch", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "15.7.31" }, { "model": "10.2-beta2-p3", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2" }, { "model": "msr3012 ac router", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "smartcloud entry appliance fi", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.0.4" }, { "model": "management heartbeat server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "flex system fc3171 8gb san switch and san pass-thru", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "9.1.7.03.00" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.09" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.0" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.4" }, { "model": "real-time compression appliance", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "4.1.17" }, { "model": "p6", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.4" }, { "model": "switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "105040" }, { "model": "connected grid routers", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "125180" }, { "model": "telepresence integrator c series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "taa switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "105040" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.2" }, { "model": "p7", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.4" }, { "model": "nac server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.3" }, { "model": "ntp", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.3" }, { "model": "smartcloud entry appliance fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.12" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.1" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.01" }, { "model": "ntp", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.1.2" }, { "model": "p5", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.4" }, { "model": "flexfabric 2.4tbps taa-compliant fabric/main processing uni", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "79100" }, { "model": "nac appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "5130-48g-4sfp+ ei switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "smartcloud entry appliance fixpac", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.2" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.3" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.0" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.09" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "security access manager for web", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.02" }, { "model": "a12508 switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "application policy infrastructure controller", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "5130-24g-2sfp+-2xgt ei switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "ntp", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.3.25" }, { "model": "network analysis module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "4.2.8p4", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "15.6.4" }, { "model": "purview appliance", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "6.4" }, { "model": "prime infrastructure", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "power hmc", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1.0.0" }, { "model": "identity services engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "15.3" }, { "model": "5130-48g-2sfp+-2xgt ei switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "4.2.8p6", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "nac appliance", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "6.4" }, { "model": "telepresence ex series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "msr1002-4 ac router", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "105120" }, { "model": "qlogic virtual fabric extension module for ibm bladecenter", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "4.2.7p11", "scope": null, "trust": 0.3, "vendor": "ntp", "version": null }, { "model": "5900af-48xg-4qsfp+ switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "type d main processing unit with comware os", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10500v70" }, { "model": "taa switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "105120" }, { "model": "smartcloud entry jre update", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.0.34" }, { "model": "vsr1001 virtual services router day evaluation software", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "600" }, { "model": "unified communications manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.37" }, { "model": "24g sfp 4sfp+ hi 1-slot switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "55100" }, { "model": "10.2-release-p6", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "10.2-stable", "scope": "ne", "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "9.3-release-p5", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "5920af-24xg taa switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "smartcloud entry fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.010" }, { "model": "junos os", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "flexfabric switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "79040" }, { "model": "flexfabric 12908e switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "xenserver", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "6.2" }, { "model": "9.3-beta1-p2", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "linux -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.1" }, { "model": "telepresence conductor", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry appliance fixpac", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1" }, { "model": "security access manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.0" }, { "model": "content security appliance updater servers", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "centos", "scope": "eq", "trust": 0.3, "vendor": "centos", "version": "6" }, { "model": "flexfabric taa-compliant switch ac chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "129100" }, { "model": "10.1-release-p16", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "unified communications manager session management edition", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "flexfabric 5700-40xg-2qsfp+ switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "9.3-release-p6", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "main processing unit", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "75020" }, { "model": "support central", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "9.3-release-p9", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "ff 12518e ac switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "small business series wireless access points", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5000" }, { "model": "virtual security gateway for microsoft hyper-v", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "p4", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.2.2" }, { "model": "flexfabric 5900cp 48xg 4qsfp+ taa-compliant", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "prime service catalog virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "access registrar appliance", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "24g poe+ 4sfp+ hi 1-slot switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "55100" }, { "model": "ntp", "scope": "eq", "trust": 0.3, "vendor": "ntp", "version": "4.3.90" }, { "model": "hsr6602-g router", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "videoscape control suite", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "1950-48g-2sfp+-2xgt-poe+ switch", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "0" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "telepresence mx series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ucs central", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "telepresence profile series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "msr3024 poe router", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "a12518 switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "visual quality experience tools server", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.4" }, { "model": "emergency responder", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "15.7.2" }, { "model": "im and presence service", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "ruggedcom rox", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "2.0" }, { "model": "ruggedcom rox", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "2.6.3" }, { "model": "flexfabric switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11908-v0" }, { "model": "smartcloud entry appliance fi", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.0.4" }, { "model": "cloud object store", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "10.2-prerelease", "scope": null, "trust": 0.3, "vendor": "freebsd", "version": null }, { "model": "switch chassis", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "10508-v0" }, { "model": "qlogic 8gb intelligent pass-thru module and san switch module", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.10" }, { "model": "vm server for", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "x863.4" }, { "model": "vm server for", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "x863.3" }, { "model": "vm server for", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "x863.2" }, { "model": "integrated lights out manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.2" }, { "model": "integrated lights out manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.1" }, { "model": "integrated lights out manager", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "3.0" } ], "sources": [ { "db": "CERT/CC", "id": "VU#718152" }, { "db": "BID", "id": "77280" }, { "db": "BID", "id": "92012" }, { "db": "JVNDB", "id": "JVNDB-2015-007700" }, { "db": "CNNVD", "id": "CNNVD-201510-585" }, { "db": "NVD", "id": "CVE-2015-7704" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.2.8", "versionStartIncluding": "4.2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.3.77", "versionStartIncluding": "4.3.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netapp:data_ontap:-:*:*:*:*:7-mode:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mcafee:enterprise_security_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.4.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mcafee:enterprise_security_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "11.2.0", "versionStartIncluding": "11.0.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:citrix:xenserver:6.2.0:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:citrix:xenserver:6.5:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-7704" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Aanchal Malhotra, Isaac E. Cohen, Erik Brakke, and Sharon Goldberg from Boston University", "sources": [ { "db": "BID", "id": "77280" } ], "trust": 0.3 }, "cve": "CVE-2015-7704", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": true, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-7704", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-7704", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2015-7704", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201510-585", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2015-7704", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2015-7704" }, { "db": "JVNDB", "id": "JVNDB-2015-007700" }, { "db": "CNNVD", "id": "CNNVD-201510-585" }, { "db": "NVD", "id": "CVE-2015-7704" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted \"KOD\" messages. The NTP.org reference implementation of ntpd contains multiple vulnerabilities. NTP Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Network Time Protocol is prone to a denial-of-service vulnerability. \nAn attacker can leverage this issue to cause a denial-of-service condition. Oracle Integrated Lights Out Manager is prone to a remote security vulnerability in ILOM. \nThe vulnerability can be exploited over the \u0027SSH\u0027 protocol. The \u0027SSH\u0027 sub component is affected. \nThis vulnerability affects the following supported versions:\n3.0, 3.1, 3.2\nNOTE: This BID is being retired as it is a duplicate of BID 75990 (OpenSSH Login Handling Security Bypass Weakness). Summary:\n\nUpdated ntp packages that fix two security issues are now available for\nRed Hat Enterprise Linux 6 and 7. \n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, noarch, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64\n\n3. \n\nIt was discovered that ntpd as a client did not correctly check timestamps\nin Kiss-of-Death packets. (CVE-2015-7704)\n\nIt was found that ntpd did not correctly implement the threshold limitation\nfor the \u0027-g\u0027 option, which is used to set the time without any\nrestrictions. A man-in-the-middle attacker able to intercept NTP traffic\nbetween a connecting client and an NTP server could use this flaw to force\nthat client to make multiple steps larger than the panic threshold,\neffectively changing the time to an arbitrary value. (CVE-2015-5300)\n\nRed Hat would like to thank Aanchal Malhotra, Isaac E. Cohen, and Sharon\nGoldberg of Boston University for reporting these issues. \n\nAll ntp users are advised to upgrade to these updated packages, which\ncontain backported patches to resolve these issues. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1271070 - CVE-2015-7704 ntp: disabling synchronization via crafted KoD packet\n1271076 - CVE-2015-5300 ntp: MITM attacker can force ntpd to make a step larger than the panic threshold\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nntp-4.2.6p5-5.el6_7.2.src.rpm\n\ni386:\nntp-4.2.6p5-5.el6_7.2.i686.rpm\nntp-debuginfo-4.2.6p5-5.el6_7.2.i686.rpm\nntpdate-4.2.6p5-5.el6_7.2.i686.rpm\n\nx86_64:\nntp-4.2.6p5-5.el6_7.2.x86_64.rpm\nntp-debuginfo-4.2.6p5-5.el6_7.2.x86_64.rpm\nntpdate-4.2.6p5-5.el6_7.2.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\ni386:\nntp-debuginfo-4.2.6p5-5.el6_7.2.i686.rpm\nntp-perl-4.2.6p5-5.el6_7.2.i686.rpm\n\nnoarch:\nntp-doc-4.2.6p5-5.el6_7.2.noarch.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-5.el6_7.2.x86_64.rpm\nntp-perl-4.2.6p5-5.el6_7.2.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nntp-4.2.6p5-5.el6_7.2.src.rpm\n\nx86_64:\nntp-4.2.6p5-5.el6_7.2.x86_64.rpm\nntp-debuginfo-4.2.6p5-5.el6_7.2.x86_64.rpm\nntpdate-4.2.6p5-5.el6_7.2.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nnoarch:\nntp-doc-4.2.6p5-5.el6_7.2.noarch.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-5.el6_7.2.x86_64.rpm\nntp-perl-4.2.6p5-5.el6_7.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nntp-4.2.6p5-5.el6_7.2.src.rpm\n\ni386:\nntp-4.2.6p5-5.el6_7.2.i686.rpm\nntp-debuginfo-4.2.6p5-5.el6_7.2.i686.rpm\nntpdate-4.2.6p5-5.el6_7.2.i686.rpm\n\nppc64:\nntp-4.2.6p5-5.el6_7.2.ppc64.rpm\nntp-debuginfo-4.2.6p5-5.el6_7.2.ppc64.rpm\nntpdate-4.2.6p5-5.el6_7.2.ppc64.rpm\n\ns390x:\nntp-4.2.6p5-5.el6_7.2.s390x.rpm\nntp-debuginfo-4.2.6p5-5.el6_7.2.s390x.rpm\nntpdate-4.2.6p5-5.el6_7.2.s390x.rpm\n\nx86_64:\nntp-4.2.6p5-5.el6_7.2.x86_64.rpm\nntp-debuginfo-4.2.6p5-5.el6_7.2.x86_64.rpm\nntpdate-4.2.6p5-5.el6_7.2.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\ni386:\nntp-debuginfo-4.2.6p5-5.el6_7.2.i686.rpm\nntp-perl-4.2.6p5-5.el6_7.2.i686.rpm\n\nnoarch:\nntp-doc-4.2.6p5-5.el6_7.2.noarch.rpm\n\nppc64:\nntp-debuginfo-4.2.6p5-5.el6_7.2.ppc64.rpm\nntp-perl-4.2.6p5-5.el6_7.2.ppc64.rpm\n\ns390x:\nntp-debuginfo-4.2.6p5-5.el6_7.2.s390x.rpm\nntp-perl-4.2.6p5-5.el6_7.2.s390x.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-5.el6_7.2.x86_64.rpm\nntp-perl-4.2.6p5-5.el6_7.2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nntp-4.2.6p5-5.el6_7.2.src.rpm\n\ni386:\nntp-4.2.6p5-5.el6_7.2.i686.rpm\nntp-debuginfo-4.2.6p5-5.el6_7.2.i686.rpm\nntpdate-4.2.6p5-5.el6_7.2.i686.rpm\n\nx86_64:\nntp-4.2.6p5-5.el6_7.2.x86_64.rpm\nntp-debuginfo-4.2.6p5-5.el6_7.2.x86_64.rpm\nntpdate-4.2.6p5-5.el6_7.2.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\ni386:\nntp-debuginfo-4.2.6p5-5.el6_7.2.i686.rpm\nntp-perl-4.2.6p5-5.el6_7.2.i686.rpm\n\nnoarch:\nntp-doc-4.2.6p5-5.el6_7.2.noarch.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-5.el6_7.2.x86_64.rpm\nntp-perl-4.2.6p5-5.el6_7.2.x86_64.rpm\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nntp-4.2.6p5-19.el7_1.3.src.rpm\n\nx86_64:\nntp-4.2.6p5-19.el7_1.3.x86_64.rpm\nntp-debuginfo-4.2.6p5-19.el7_1.3.x86_64.rpm\nntpdate-4.2.6p5-19.el7_1.3.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nnoarch:\nntp-doc-4.2.6p5-19.el7_1.3.noarch.rpm\nntp-perl-4.2.6p5-19.el7_1.3.noarch.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-19.el7_1.3.x86_64.rpm\nsntp-4.2.6p5-19.el7_1.3.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nntp-4.2.6p5-19.el7_1.3.src.rpm\n\nx86_64:\nntp-4.2.6p5-19.el7_1.3.x86_64.rpm\nntp-debuginfo-4.2.6p5-19.el7_1.3.x86_64.rpm\nntpdate-4.2.6p5-19.el7_1.3.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nnoarch:\nntp-doc-4.2.6p5-19.el7_1.3.noarch.rpm\nntp-perl-4.2.6p5-19.el7_1.3.noarch.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-19.el7_1.3.x86_64.rpm\nsntp-4.2.6p5-19.el7_1.3.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nntp-4.2.6p5-19.el7_1.3.src.rpm\n\nppc64:\nntp-4.2.6p5-19.el7_1.3.ppc64.rpm\nntp-debuginfo-4.2.6p5-19.el7_1.3.ppc64.rpm\nntpdate-4.2.6p5-19.el7_1.3.ppc64.rpm\n\ns390x:\nntp-4.2.6p5-19.el7_1.3.s390x.rpm\nntp-debuginfo-4.2.6p5-19.el7_1.3.s390x.rpm\nntpdate-4.2.6p5-19.el7_1.3.s390x.rpm\n\nx86_64:\nntp-4.2.6p5-19.el7_1.3.x86_64.rpm\nntp-debuginfo-4.2.6p5-19.el7_1.3.x86_64.rpm\nntpdate-4.2.6p5-19.el7_1.3.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nntp-4.2.6p5-19.ael7b_1.3.src.rpm\n\nppc64le:\nntp-4.2.6p5-19.ael7b_1.3.ppc64le.rpm\nntp-debuginfo-4.2.6p5-19.ael7b_1.3.ppc64le.rpm\nntpdate-4.2.6p5-19.ael7b_1.3.ppc64le.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nnoarch:\nntp-doc-4.2.6p5-19.el7_1.3.noarch.rpm\nntp-perl-4.2.6p5-19.el7_1.3.noarch.rpm\n\nppc64:\nntp-debuginfo-4.2.6p5-19.el7_1.3.ppc64.rpm\nsntp-4.2.6p5-19.el7_1.3.ppc64.rpm\n\ns390x:\nntp-debuginfo-4.2.6p5-19.el7_1.3.s390x.rpm\nsntp-4.2.6p5-19.el7_1.3.s390x.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-19.el7_1.3.x86_64.rpm\nsntp-4.2.6p5-19.el7_1.3.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\nnoarch:\nntp-doc-4.2.6p5-19.ael7b_1.3.noarch.rpm\nntp-perl-4.2.6p5-19.ael7b_1.3.noarch.rpm\n\nppc64le:\nntp-debuginfo-4.2.6p5-19.ael7b_1.3.ppc64le.rpm\nsntp-4.2.6p5-19.ael7b_1.3.ppc64le.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nntp-4.2.6p5-19.el7_1.3.src.rpm\n\nx86_64:\nntp-4.2.6p5-19.el7_1.3.x86_64.rpm\nntp-debuginfo-4.2.6p5-19.el7_1.3.x86_64.rpm\nntpdate-4.2.6p5-19.el7_1.3.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nnoarch:\nntp-doc-4.2.6p5-19.el7_1.3.noarch.rpm\nntp-perl-4.2.6p5-19.el7_1.3.noarch.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-19.el7_1.3.x86_64.rpm\nsntp-4.2.6p5-19.el7_1.3.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2015-5300\nhttps://access.redhat.com/security/cve/CVE-2015-7704\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2015 Red Hat, Inc. \n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201607-15\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: NTP: Multiple vulnerabilities\n Date: July 20, 2016\n Bugs: #563774, #572452, #581528, #584954\n ID: 201607-15\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in NTP, the worst of which\ncould lead to Denial of Service. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-misc/ntp \u003c 4.2.8_p8 \u003e= 4.2.8_p8\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in NTP. Please review the\nCVE identifiers referenced below for details. \n\nResolution\n==========\n\nAll NTP users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-misc/ntp-4.2.8_p8\"\n\nReferences\n==========\n\n[ 1 ] CVE-2015-7691\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7691\n[ 2 ] CVE-2015-7692\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7692\n[ 3 ] CVE-2015-7701\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7701\n[ 4 ] CVE-2015-7702\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7702\n[ 5 ] CVE-2015-7703\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7703\n[ 6 ] CVE-2015-7704\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7704\n[ 7 ] CVE-2015-7705\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7705\n[ 8 ] CVE-2015-7848\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7848\n[ 9 ] CVE-2015-7849\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7849\n[ 10 ] CVE-2015-7850\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7850\n[ 11 ] CVE-2015-7851\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7851\n[ 12 ] CVE-2015-7852\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7852\n[ 13 ] CVE-2015-7853\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7853\n[ 14 ] CVE-2015-7854\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7854\n[ 15 ] CVE-2015-7855\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7855\n[ 16 ] CVE-2015-7871\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7871\n[ 17 ] CVE-2015-7973\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7973\n[ 18 ] CVE-2015-7974\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7974\n[ 19 ] CVE-2015-7975\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7975\n[ 20 ] CVE-2015-7976\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7976\n[ 21 ] CVE-2015-7977\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7977\n[ 22 ] CVE-2015-7978\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7978\n[ 23 ] CVE-2015-7979\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7979\n[ 24 ] CVE-2015-8138\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8138\n[ 25 ] CVE-2015-8139\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8139\n[ 26 ] CVE-2015-8140\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8140\n[ 27 ] CVE-2015-8158\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8158\n[ 28 ] CVE-2016-1547\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1547\n[ 29 ] CVE-2016-1548\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1548\n[ 30 ] CVE-2016-1549\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1549\n[ 31 ] CVE-2016-1550\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1550\n[ 32 ] CVE-2016-1551\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1551\n[ 33 ] CVE-2016-2516\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2516\n[ 34 ] CVE-2016-2517\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2517\n[ 35 ] CVE-2016-2518\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2518\n[ 36 ] CVE-2016-2519\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2519\n[ 37 ] CVE-2016-4953\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4953\n[ 38 ] CVE-2016-4954\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4954\n[ 39 ] CVE-2016-4955\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4955\n[ 40 ] CVE-2016-4956\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4956\n[ 41 ] CVE-2016-4957\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4957\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201607-15\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2016 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n. \n\nRelease Date: 2016-09-21\nLast Updated: 2016-09-21\n\nPotential Security Impact: Multiple Remote Vulnerabilities\n\nSource: Hewlett Packard Enterprise, Product Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities in NTP have been addressed with HPE\nComware 7 (CW7) network products. \n\nReferences:\n\n - CVE-2015-7704\n - CVE-2015-7705\n - CVE-2015-7855\n - CVE-2015-7871\n - PSRT110228\n - SSRT102943\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n - Comware 7 (CW7) Products - Please refer to the RESOLUTION\n below for a list of impacted products. All product versions are impacted\nprior to the fixed versions listed. \n\nBACKGROUND\n\n CVSS Base Metrics\n =================\n Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector\n\n CVE-2015-7704\n 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L\n 6.4 (AV:N/AC:L/Au:N/C:N/I:P/A:P)\n\n CVE-2015-7705\n 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L\n 6.4 (AV:N/AC:L/Au:N/C:N/I:P/A:P)\n\n CVE-2015-7855\n 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L\n 6.4 (AV:N/AC:L/Au:N/C:N/I:P/A:P)\n\n CVE-2015-7871\n 5.3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\n 5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)\n\n Information on CVSS is documented in\n HPE Customer Notice HPSN-2008-002 here:\n\nhttps://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499\n\nRESOLUTION\nHPE has released the following software updates to resolve the\nvulnerabilities in HPE Comware 7 network products. \n\n**COMWARE 7 Products**\n\n + **12500 (Comware 7) - Version: R7377**\n * HP Network Products\n - JC072B HP 12500 Main Processing Unit\n - JC085A HP A12518 Switch Chassis\n - JC086A HP A12508 Switch Chassis\n - JC652A HP 12508 DC Switch Chassis\n - JC653A HP 12518 DC Switch Chassis\n - JC654A HP 12504 AC Switch Chassis\n - JC655A HP 12504 DC Switch Chassis\n - JF430A HP A12518 Switch Chassis\n - JF430B HP 12518 Switch Chassis\n - JF430C HP 12518 AC Switch Chassis\n - JF431A HP A12508 Switch Chassis\n - JF431B HP 12508 Switch Chassis\n - JF431C HP 12508 AC Switch Chassis\n - JG497A HP 12500 MPU w/Comware V7 OS\n - JG782A HP FF 12508E AC Switch Chassis\n - JG783A HP FF 12508E DC Switch Chassis\n - JG784A HP FF 12518E AC Switch Chassis\n - JG785A HP FF 12518E DC Switch Chassis\n - JG802A HP FF 12500E MPU\n + **10500 (Comware 7) - Version: R7178**\n * HP Network Products\n - JC611A HP 10508-V Switch Chassis\n - JC612A HP 10508 Switch Chassis\n - JC613A HP 10504 Switch Chassis\n - JC748A HP 10512 Switch Chassis\n - JG608A HP FlexFabric 11908-V Switch Chassis\n - JG609A HP FlexFabric 11900 Main Processing Unit\n - JG820A HP 10504 TAA Switch Chassis\n - JG821A HP 10508 TAA Switch Chassis\n - JG822A HP 10508-V TAA Switch Chassis\n - JG823A HP 10512 TAA Switch Chassis\n - JG496A HP 10500 Type A MPU w/Comware v7 OS\n - JH198A HP 10500 Type D Main Processing Unit with Comware v7 Operating\nSystem\n - JH206A HP 10500 Type D TAA-compliant with Comware v7 Operating System\nMain Processing Unit\n + **12900 (Comware 7) - Version: R1138P03**\n * HP Network Products\n - JG619A HP FlexFabric 12910 Switch AC Chassis\n - JG621A HP FlexFabric 12910 Main Processing Unit\n - JG632A HP FlexFabric 12916 Switch AC Chassis\n - JG634A HP FlexFabric 12916 Main Processing Unit\n - JH104A HP FlexFabric 12900E Main Processing Unit\n - JH114A HP FlexFabric 12910 TAA-compliant Main Processing Unit\n - JH263A HP FlexFabric 12904E Main Processing Unit\n - JH255A HP FlexFabric 12908E Switch Chassis\n - JH262A HP FlexFabric 12904E Switch Chassis\n - JH113A HP FlexFabric 12910 TAA-compliant Switch AC Chassis\n - JH103A HP FlexFabric 12916E Switch Chassis\n + **5900 (Comware 7) - Version: R2422P02**\n * HP Network Products\n - JC772A HP 5900AF-48XG-4QSFP+ Switch\n - JG296A HP 5920AF-24XG Switch\n - JG336A HP 5900AF-48XGT-4QSFP+ Switch\n - JG510A HP 5900AF-48G-4XG-2QSFP+ Switch\n - JG554A HP 5900AF-48XG-4QSFP+ TAA Switch\n - JG555A HP 5920AF-24XG TAA Switch\n - JG838A HP FF 5900CP-48XG-4QSFP+ Switch\n - JH036A HP FlexFabric 5900CP 48XG 4QSFP+ TAA-Compliant\n - JH037A HP 5900AF 48XGT 4QSFP+ TAA-Compliant Switch\n - JH038A HP 5900AF 48G 4XG 2QSFP+ TAA-Compliant\n + **MSR1000 (Comware 7) - Version: R0305P08**\n * HP Network Products\n - JG875A HP MSR1002-4 AC Router\n - JH060A HP MSR1003-8S AC Router\n + **MSR2000 (Comware 7) - Version: R0305P08**\n * HP Network Products\n - JG411A HP MSR2003 AC Router\n - JG734A HP MSR2004-24 AC Router\n - JG735A HP MSR2004-48 Router\n - JG866A HP MSR2003 TAA-compliant AC Router\n + **MSR3000 (Comware 7) - Version: R0305P08**\n * HP Network Products\n - JG404A HP MSR3064 Router\n - JG405A HP MSR3044 Router\n - JG406A HP MSR3024 AC Router\n - JG407A HP MSR3024 DC Router\n - JG408A HP MSR3024 PoE Router\n - JG409A HP MSR3012 AC Router\n - JG410A HP MSR3012 DC Router\n - JG861A HP MSR3024 TAA-compliant AC Router\n + **MSR4000 (Comware 7) - Version: R0305P08**\n * HP Network Products\n - JG402A HP MSR4080 Router Chassis\n - JG403A HP MSR4060 Router Chassis\n - JG412A HP MSR4000 MPU-100 Main Processing Unit\n - JG869A HP MSR4000 TAA-compliant MPU-100 Main Processing Unit\n + **VSR (Comware 7) - Version: E0322**\n * HP Network Products\n - JG810AAE HP VSR1001 Virtual Services Router 60 Day Evaluation\nSoftware\n - JG811AAE HP VSR1001 Comware 7 Virtual Services Router\n - JG812AAE HP VSR1004 Comware 7 Virtual Services Router\n - JG813AAE HP VSR1008 Comware 7 Virtual Services Router\n + **7900 (Comware 7) - Version: R2138P03**\n * HP Network Products\n - JG682A HP FlexFabric 7904 Switch Chassis\n - JG841A HP FlexFabric 7910 Switch Chassis\n - JG842A HP FlexFabric 7910 7.2Tbps Fabric / Main Processing Unit\n - JH001A HP FlexFabric 7910 2.4Tbps Fabric / Main Processing Unit\n - JH122A HP FlexFabric 7904 TAA-compliant Switch Chassis\n - JH123A HP FlexFabric 7910 TAA-compliant Switch Chassis\n - JH124A HP FlexFabric 7910 7.2Tbps TAA-compliant Fabric/Main\nProcessing Unit\n - JH125A HP FlexFabric 7910 2.4Tbps TAA-compliant Fabric/Main\nProcessing Unit\n + **5130 (Comware 7) - Version: R3111P03**\n * HP Network Products\n - JG932A HP 5130-24G-4SFP+ EI Switch\n - JG933A HP 5130-24G-SFP-4SFP+ EI Switch\n - JG934A HP 5130-48G-4SFP+ EI Switch\n - JG936A HP 5130-24G-PoE+-4SFP+ (370W) EI Switch\n - JG937A HP 5130-48G-PoE+-4SFP+ (370W) EI Switch\n - JG938A HP 5130-24G-2SFP+-2XGT EI Switch\n - JG939A HP 5130-48G-2SFP+-2XGT EI Switch\n - JG940A HP 5130-24G-PoE+-2SFP+-2XGT (370W) EI Switch\n - JG941A HP 5130-48G-PoE+-2SFP+-2XGT (370W) EI Switch\n - JG975A HP 5130-24G-4SFP+ EI Brazil Switch\n - JG976A HP 5130-48G-4SFP+ EI Brazil Switch\n - JG977A HP 5130-24G-PoE+-4SFP+ (370W) EI Brazil Switch\n - JG978A HP 5130-48G-PoE+-4SFP+ (370W) EI Brazil Switch\n + **5700 (Comware 7) - Version: R2422P02**\n * HP Network Products\n - JG894A HP FlexFabric 5700-48G-4XG-2QSFP+ Switch\n - JG895A HP FlexFabric 5700-48G-4XG-2QSFP+ TAA-compliant Switch\n - JG896A HP FlexFabric 5700-40XG-2QSFP+ Switch\n - JG897A HP FlexFabric 5700-40XG-2QSFP+ TAA-compliant Switch\n - JG898A HP FlexFabric 5700-32XGT-8XG-2QSFP+ Switch\n - JG899A HP FlexFabric 5700-32XGT-8XG-2QSFP+ TAA-compliant Switch\n + **5930 (Comware 7) - Version: R2422P02**\n * HP Network Products\n - JG726A HP FlexFabric 5930 32QSFP+ Switch\n - JG727A HP FlexFabric 5930 32QSFP+ TAA-compliant Switch\n - JH178A HP FlexFabric 5930 2QSFP+ 2-slot Switch\n - JH179A HP FlexFabric 5930 4-slot Switch\n - JH187A HP FlexFabric 5930 2QSFP+ 2-slot TAA-compliant Switch\n - JH188A HP FlexFabric 5930 4-slot TAA-compliant Switch\n + **HSR6600 (Comware 7) - Version: R7103P07**\n * HP Network Products\n - JG353A HP HSR6602-G Router\n - JG354A HP HSR6602-XG Router\n - JG776A HP HSR6602-G TAA-compliant Router\n - JG777A HP HSR6602-XG TAA-compliant Router\n + **HSR6800 (Comware 7) - Version: R7103P07**\n * HP Network Products\n - JG361A HP HSR6802 Router Chassis\n - JG361B HP HSR6802 Router Chassis\n - JG362A HP HSR6804 Router Chassis\n - JG362B HP HSR6804 Router Chassis\n - JG363A HP HSR6808 Router Chassis\n - JG363B HP HSR6808 Router Chassis\n - JG364A HP HSR6800 RSE-X2 Router Main Processing Unit\n - JG779A HP HSR6800 RSE-X2 Router TAA-compliant Main Processing\n - JH075A HP HSR6800 RSE-X3 Router Main Processing Unit\n + **1950 (Comware 7) - Version: R3111P03**\n * HP Network Products\n - JG960A HP 1950-24G-4XG Switch\n - JG961A HP 1950-48G-2SFP+-2XGT Switch\n - JG962A HP 1950-24G-2SFP+-2XGT-PoE+(370W) Switch\n - JG963A HP 1950-48G-2SFP+-2XGT-PoE+(370W) Switch\n + **7500 (Comware 7) - Version: R7178**\n * HP Network Products\n - JD238C HP 7510 Switch Chassis\n - JD239C HP 7506 Switch Chassis\n - JD240C HP 7503 Switch Chassis\n - JD242C HP 7502 Switch Chassis\n - JH207A HP 7500 1.2Tbps Fabric with 2-port 40GbE QSFP+ for IRF-Only\nMain Processing Unit\n - JH208A HP 7502 Main Processing Unit\n - JH209A HP 7500 2.4Tbps Fabric with 8-port 1/10GbE SFP+ and 2-port\n40GbE QSFP+ Main Processing Unit\n + **5130HI - Version: R1118P02**\n * HP Network Products\n - JH323A HPE 5130 24G 4SFP+ 1-slot HI Switch\n - JH324A HPE 5130 48G 4SFP+ 1-slot HI Switch\n - JH325A HPE 5130 24G PoE+ 4SFP+ 1-slot HI Switch\n - JH326A HPE 5130 48G PoE+ 4SFP+ 1-slot HI Switch\n + **5510HI - Version: R1118P02**\n * HP Network Products\n - JH145A HPE 5510 24G 4SFP+ HI 1-slot Switch\n - JH146A HPE 5510 48G 4SFP+ HI 1-slot Switch\n - JH147A HPE 5510 24G PoE+ 4SFP+ HI 1-slot Switch\n - JH148A HPE 5510 48G PoE+ 4SFP+ HI 1-slot Switch\n - JH149A HPE 5510 24G SFP 4SFP+ HI 1-slot Switch\n\n**Note:** Please contact HPE Technical Support if any assistance is needed\nacquiring the software updates. \n\nHISTORY\nVersion:1 (rev.1) - 21 September 2016 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running Hewlett Packard Enterprise (HPE) software\nproducts should be applied in accordance with the customer\u0027s patch management\npolicy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HPE Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hpe.com. \n\nReport: To report a potential security vulnerability for any HPE supported\nproduct:\n Web form: https://www.hpe.com/info/report-security-vulnerability\n Email: security-alert@hpe.com\n\nSubscribe: To initiate a subscription to receive future HPE Security Bulletin\nalerts via Email: http://www.hpe.com/support/Subscriber_Choice\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here: http://www.hpe.com/support/Security_Bulletin_Archive\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HPE General Software\nHF = HPE Hardware and Firmware\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPV = ProCurve\nST = Storage Software\nUX = HP-UX\n\nCopyright 2016 Hewlett Packard Enterprise\n\nHewlett Packard Enterprise shall not be liable for technical or editorial\nerrors or omissions contained herein. The information provided is provided\n\"as is\" without warranty of any kind. To the extent permitted by law, neither\nHP or its affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. Hewlett\nPackard Enterprise and the names of Hewlett Packard Enterprise products\nreferenced herein are trademarks of Hewlett Packard Enterprise in the United\nStates and other countries. Other product and company names mentioned herein\nmay be trademarks of their respective owners. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=============================================================================\nFreeBSD-SA-15:25.ntp Security Advisory\n The FreeBSD Project\n\nTopic: Multiple vulnerabilities of ntp\n\nCategory: contrib\nModule: ntp\nAnnounced: 2015-10-26\nCredits: Network Time Foundation\nAffects: All supported versions of FreeBSD. \nCorrected: 2015-10-26 11:35:40 UTC (stable/10, 10.2-STABLE)\n 2015-10-26 11:36:55 UTC (releng/10.2, 10.2-RELEASE-p6)\n 2015-10-26 11:37:31 UTC (releng/10.1, 10.1-RELEASE-p23)\n 2015-10-26 11:36:40 UTC (stable/9, 9.3-STABLE)\n 2015-10-26 11:42:25 UTC (releng/9.3, 9.3-RELEASE-p29)\nCVE Name: CVE-2015-7701, CVE-2015-7702, CVE-2015-7703, CVE-2015-7704,\n CVE-2015-7848, CVE-2015-7849, CVE-2015-7850, CVE-2015-7851,\n CVE-2015-7852, CVE-2015-7853, CVE-2015-7854, CVE-2015-7855,\n CVE-2015-7871\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit https://security.FreeBSD.org/. \n\nI. \n\nII. Problem Description\n\nCrypto-NAK packets can be used to cause ntpd(8) to accept time from an\nunauthenticated ephemeral symmetric peer by bypassing the authentication\nrequired to mobilize peer associations. [CVE-2015-7871] FreeBSD 9.3 and\n10.1 are not affected. \n\nIf ntpd(8) is fed a crafted mode 6 or mode 7 packet containing an unusual\nlong data value where a network address is expected, the decodenetnum()\nfunction will abort with an assertion failure instead of simply returning\na failure condition. [CVE-2015-7855]\n\nIf ntpd(8) is configured to allow remote configuration, and if the\n(possibly spoofed) source IP address is allowed to send remote\nconfiguration requests, and if the attacker knows the remote\nconfiguration password or if ntpd(8) was configured to disable\nauthentication, then an attacker can send a set of packets to ntpd(8) that\nmay cause it to crash, with the hypothetical possibility of a small code\ninjection. [CVE-2015-7854]\n\nA negative value for the datalen parameter will overflow a data buffer. \nNTF\u0027s ntpd(8) driver implementations always set this value to 0 and are\ntherefore not vulnerable to this weakness. If you are running a custom\nrefclock driver in ntpd(8) and that driver supplies a negative value for\ndatalen (no custom driver of even minimal competence would do this)\nthen ntpd would overflow a data buffer. It is even hypothetically\npossible in this case that instead of simply crashing ntpd the\nattacker could effect a code injection attack. [CVE-2015-7853]\n\nIf an attacker can figure out the precise moment that ntpq(8) is listening\nfor data and the port number it is listening on or if the attacker can\nprovide a malicious instance ntpd(8) that victims will connect to then an\nattacker can send a set of crafted mode 6 response packets that, if\nreceived by ntpq(8), can cause ntpq(8) to crash. [CVE-2015-7852]\n\nIf ntpd(8) is configured to allow remote configuration, and if the\n(possibly spoofed) IP address is allowed to send remote configuration\nrequests, and if the attacker knows the remote configuration password\nor if ntpd(8) was configured to disable authentication, then an attacker\ncan send a set of packets to ntpd that may cause ntpd(8) to overwrite\nfiles. [CVE-2015-7851]. The default configuration of ntpd(8) within\nFreeBSD does not allow remote configuration. \n\nIf ntpd(8) is configured to allow remote configuration, and if the\n(possibly spoofed) source IP address is allowed to send remote\nconfiguration requests, and if the attacker knows the remote\nconfiguration password or if ntpd(8) was configured to disable\nauthentication, then an attacker can send a set of packets to ntpd\nthat will cause it to crash and/or create a potentially huge log\nfile. Specifically, the attacker could enable extended logging,\npoint the key file at the log file, and cause what amounts to an\ninfinite loop. [CVE-2015-7850]. The default configuration of ntpd(8)\nwithin FreeBSD does not allow remote configuration. \n\nIf ntpd(8) is configured to allow remote configuration, and if the\n(possibly spoofed) source IP address is allowed to send remote\nconfiguration requests, and if the attacker knows the remote\nconfiguration password or if ntpd was configured to disable\nauthentication, then an attacker can send a set of packets to\nntpd that may cause a crash or theoretically perform a code\ninjection attack. [CVE-2015-7849]. The default configuration of ntpd(8)\nwithin FreeBSD does not allow remote configuration. \n\nIf ntpd(8) is configured to enable mode 7 packets, and if the use\nof mode 7 packets is not properly protected thru the use of the\navailable mode 7 authentication and restriction mechanisms, and\nif the (possibly spoofed) source IP address is allowed to send\nmode 7 queries, then an attacker can send a crafted packet to\nntpd that will cause it to crash. [CVE-2015-7848]. The default\nconfiguration of ntpd(8) within FreeBSD does not allow mode 7\npackets. \n\nIf ntpd(8) is configured to use autokey, then an attacker can send\npackets to ntpd that will, after several days of ongoing attack,\ncause it to run out of memory. [CVE-2015-7701]. The default\nconfiguration of ntpd(8) within FreeBSD does not use autokey. \n\nIf ntpd(8) is configured to allow for remote configuration, and if\nthe (possibly spoofed) source IP address is allowed to send\nremote configuration requests, and if the attacker knows the\nremote configuration password, it\u0027s possible for an attacker\nto use the \"pidfile\" or \"driftfile\" directives to potentially\noverwrite other files. [CVE-2015-5196]. The default configuration\nof ntpd(8) within FreeBSD does not allow remote configuration\n\nAn ntpd(8) client that honors Kiss-of-Death responses will honor\nKoD messages that have been forged by an attacker, causing it\nto delay or stop querying its servers for time updates. Also,\nan attacker can forge packets that claim to be from the target\nand send them to servers often enough that a server that\nimplements KoD rate limiting will send the target machine a\nKoD response to attempt to reduce the rate of incoming packets,\nor it may also trigger a firewall block at the server for\npackets from the target machine. For either of these attacks\nto succeed, the attacker must know what servers the target\nis communicating with. An attacker can be anywhere on the\nInternet and can frequently learn the identity of the target\u0027s\ntime source by sending the target a time query. [CVE-2015-7704]\n\nThe fix for CVE-2014-9750 was incomplete in that there were\ncertain code paths where a packet with particular autokey\noperations that contained malicious data was not always being\ncompletely validated. Receipt of these packets can cause ntpd\nto crash. [CVE-2015-7702]. The default configuration of ntpd(8)\nwithin FreeBSD does not use autokey. \n\nIII. Impact\n\nAn attacker which can send NTP packets to ntpd(8), which uses cryptographic\nauthentication of NTP data, may be able to inject malicious time data\ncausing the system clock to be set incorrectly. [CVE-2015-7871]\n\nAn attacker which can send NTP packets to ntpd(8), can block the\ncommunication of the daemon with time servers, causing the system\nclock not being synchronized. [CVE-2015-7704]\n\nAn attacker which can send NTP packets to ntpd(8), can remotely crash\nthe daemon, sending malicious data packet. [CVE-2015-7855] [CVE-2015-7854]\n[CVE-2015-7853] [CVE-2015-7852] [CVE-2015-7849] [CVE-2015-7848]\n\nAn attacker which can send NTP packets to ntpd(8), can remotely\ntrigger the daemon to overwrite its configuration files. [CVE-2015-7851]\n[CVE-2015-5196]\n\nIV. Workaround\n\nNo workaround is available, but systems not running ntpd(8) are not\naffected. Network administrators are advised to implement BCP-38,\nwhich helps to reduce risk associated with the attacks. \n\nV. Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to a supported FreeBSD stable or\nrelease / security branch (releng) dated after the correction date. \n\nThe ntpd service has to be restarted after the update. A reboot is\nrecommended but not required. \n\n2) To update your vulnerable system via a binary patch:\n\nSystems running a RELEASE version of FreeBSD on the i386 or amd64\nplatforms can be updated via the freebsd-update(8) utility:\n\n# freebsd-update fetch\n# freebsd-update install\n\nThe ntpd service has to be restarted after the update. A reboot is\nrecommended but not required. \n\n3) To update your vulnerable system via a source code patch:\n\nThe following patches have been verified to apply to the applicable\nFreeBSD release branches. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n[FreeBSD 10.2]\n# fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-102.patch.bz2\n# bunzip2 ntp-102.patch.bz2\n# fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-102.patch.asc\n# gpg --verify ntp-102.patch.asc\n\n[FreeBSD 10.1]\n# fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-101.patch.bz2\n# bunzip2 ntp-101.patch.bz2\n# fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-101.patch.asc\n# gpg --verify ntp-101.patch.asc\n\n[FreeBSD 9.3]\n# fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-93.patch.bz2\n# bunzip2 ntp-93.patch.bz2\n# fetch https://security.FreeBSD.org/patches/SA-15:25/ntp-93.patch.asc\n# gpg --verify ntp-93.patch.asc\n\nb) Apply the patch. Execute the following commands as root:\n\n# cd /usr/src\n# patch \u003c /path/to/patch\n# find contrib/ntp -type f -empty -delete\n\nc) Recompile the operating system using buildworld and installworld as\ndescribed in https://www.FreeBSD.org/handbook/makeworld.html. \n\nd) For 9.3-RELEASE and 10.1-RELEASE an update to /etc/ntp.conf is recommended,\nwhich can be done with help of the mergemaster(8) tool on 9.3-RELEASE and\nwith help of the etcupdate(8) tool on 10.1-RELEASE. \n\nRestart the ntpd(8) daemon, or reboot the system. \n\nVI. Correction details\n\nThe following list contains the correction revision numbers for each\naffected branch. \n\nBranch/path Revision\n- -------------------------------------------------------------------------\nstable/9/ r289998\nreleng/9.3/ r290001\nstable/10/ r289997\nreleng/10.1/ r290000\nreleng/10.2/ r289999\n- -------------------------------------------------------------------------\n\nTo see which files were modified by a particular revision, run the\nfollowing command, replacing NNNNNN with the revision number, on a\nmachine with Subversion installed:\n\n# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base\n\nOr visit the following URL, replacing NNNNNN with the revision number:\n\nhttps://svnweb.freebsd.org/base?view=revision\u0026revision=NNNNNN\n\nVII. References\n\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7848\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7849\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7853\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7854\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871\n\nThe latest revision of this advisory is available at\nhttps://security.FreeBSD.org/advisories/FreeBSD-SA-15:25.ntp.asc\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nEUlBT3ViDhHNrI7PTaiI\n=djPm\n-----END PGP SIGNATURE-----\n. ============================================================================\nUbuntu Security Notice USN-2783-1\nOctober 27, 2015\n\nntp vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 15.10\n- Ubuntu 15.04\n- Ubuntu 14.04 LTS\n- Ubuntu 12.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in NTP. (CVE-2015-5146)\n\nMiroslav Lichvar discovered that NTP incorrectly handled logconfig\ndirectives. (CVE-2015-5194)\n\nMiroslav Lichvar discovered that NTP incorrectly handled certain statistics\ntypes. (CVE-2015-5195)\n\nMiroslav Lichvar discovered that NTP incorrectly handled certain file\npaths. Cohen, and Sharon Goldberg discovered that NTP\nincorrectly handled restarting after hitting a panic threshold. \n(CVE-2015-7691, CVE-2015-7692, CVE-2015-7702)\n\nIt was discovered that NTP incorrectly handled memory when processing\ncertain autokey messages. Cohen, and Sharon Goldberg discovered that NTP\nincorrectly handled rate limiting. A remote attacker could possibly use\nthis issue to cause clients to stop updating their clock. (CVE-2015-7704,\nCVE-2015-7705)\n\nYves Younan discovered that NTP incorrectly handled logfile and keyfile\ndirectives. (CVE-2015-7850)\n\nYves Younan and Aleksander Nikolich discovered that NTP incorrectly handled\nascii conversion. (CVE-2015-7852)\n\nYves Younan discovered that NTP incorrectly handled reference clock memory. \nA malicious refclock could possibly use this issue to cause NTP to crash,\nresulting in a denial of service, or possibly execute arbitrary code. \n(CVE-2015-7853)\n\nJohn D \"Doug\" Birdwell discovered that NTP incorrectly handled decoding\ncertain bogus values. (CVE-2015-7855)\n\nStephen Gray discovered that NTP incorrectly handled symmetric association\nauthentication. (CVE-2015-7871)\n\nIn the default installation, attackers would be isolated by the NTP\nAppArmor profile. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 15.10:\n ntp 1:4.2.6.p5+dfsg-3ubuntu8.1\n\nUbuntu 15.04:\n ntp 1:4.2.6.p5+dfsg-3ubuntu6.2\n\nUbuntu 14.04 LTS:\n ntp 1:4.2.6.p5+dfsg-3ubuntu2.14.04.5\n\nUbuntu 12.04 LTS:\n ntp 1:4.2.6.p3+dfsg-1ubuntu3.6\n\nIn general, a standard system update will make all the necessary changes. \n\nOn October 21st, 2015, NTP.org released a security advisory detailing 13 issues regarding multiple DoS vulnerabilities, information disclosure vulnerabilities, and logic issues that may result in an attacker gaining the ability to modify an NTP server\u0027s advertised time. \n\nWorkarounds that mitigate one or more of the vulnerabilities may be available for certain products, please see the individual Cisco Bug IDs for details. \n\nCVE-2015-5194\n\n It was found that ntpd could crash due to an uninitialized\n variable when processing malformed logconfig configuration\n commands. \n\nCVE-2015-5195\n\n It was found that ntpd exits with a segmentation fault when a\n statistics type that was not enabled during compilation (e.g. \n timingstats) is referenced by the statistics or filegen\n configuration command\n\nCVE-2015-5219\n\n It was discovered that sntp program would hang in an infinite loop\n when a crafted NTP packet was received, related to the conversion\n of the precision value in the packet to double. If the threshold is exceeded\n after that, ntpd will exit with a message to the system log. This\n option can be used with the -q and -x options. \n\n ntpd could actually step the clock multiple times by more than the\n panic threshold if its clock discipline doesn\u0027t have enough time to\n reach the sync state and stay there for at least one update. \n\n This is contrary to what the documentation says. Normally, the\n assumption is that an MITM attacker can step the clock more than the\n panic threshold only once when ntpd starts and to make a larger\n adjustment the attacker has to divide it into multiple smaller\n steps, each taking 15 minutes, which is slow. \n\nCVE-2015-7701\n\n A memory leak flaw was found in ntpd\u0027s CRYPTO_ASSOC. \n\nCVE-2015-7703\n\n Miroslav Lichvar of Red Hat found that the :config command can be\n used to set the pidfile and driftfile paths without any\n restrictions. A remote attacker could use this flaw to overwrite a\n file on the file system with a file containing the pid of the ntpd\n process (immediately) or the current estimated drift of the system\n clock (in hourly intervals). For example:\n\n ntpq -c \u0027:config pidfile /tmp/ntp.pid\u0027\n ntpq -c \u0027:config driftfile /tmp/ntp.drift\u0027\n\n In Debian ntpd is configured to drop root privileges, which limits\n the impact of this issue. \n\nCVE-2015-7704\n\n If ntpd as an NTP client receives a Kiss-of-Death (KoD) packet\n from the server to reduce its polling rate, it doesn\u0027t check if the\n originate timestamp in the reply matches the transmit timestamp from\n its request. A\n specially crafted configuration file could cause an endless loop\n resulting in a denial of service. \n\nCVE-2015-7852\n\n A potential off by one vulnerability exists in the cookedprint\n functionality of ntpq. A specially crafted buffer could cause a\n buffer overflow potentially resulting in null byte being written out\n of bounds. \n\nCVE-2015-7871\n\n An error handling logic error exists within ntpd that manifests due\n to improper error condition handling associated with certain\n crypto-NAK packets. An unauthenticated, off-path attacker can force\n ntpd processes on targeted servers to peer with time sources of the\n attacker\u0027s choosing by transmitting symmetric active crypto-NAK\n packets to ntpd. \n\nFor the oldstable distribution (wheezy), these problems have been fixed\nin version 1:4.2.6.p5+dfsg-2+deb7u6. \n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 1:4.2.6.p5+dfsg-7+deb8u1. \n\nFor the testing distribution (stretch), these problems have been fixed\nin version 1:4.2.8p4+dfsg-3. \n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 1:4.2.8p4+dfsg-3. \n\nWe recommend that you upgrade your ntp packages. \n\n\nHere are the details from the Slackware 14.1 ChangeLog:\n+--------------------------+\npatches/packages/ntp-4.2.8p4-i486-1_slack14.1.txz: Upgraded. \n In addition to bug fixes and enhancements, this release fixes\n several low and medium severity vulnerabilities. \n For more information, see:\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9750\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5196\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7705\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7848\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7849\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7853\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7854\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871\n (* Security fix *)\n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated package for Slackware 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/ntp-4.2.8p4-i486-1_slack13.0.txz\n\nUpdated package for Slackware x86_64 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/ntp-4.2.8p4-x86_64-1_slack13.0.txz\n\nUpdated package for Slackware 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/ntp-4.2.8p4-i486-1_slack13.1.txz\n\nUpdated package for Slackware x86_64 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/ntp-4.2.8p4-x86_64-1_slack13.1.txz\n\nUpdated package for Slackware 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/ntp-4.2.8p4-i486-1_slack13.37.txz\n\nUpdated package for Slackware x86_64 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/ntp-4.2.8p4-x86_64-1_slack13.37.txz\n\nUpdated package for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/ntp-4.2.8p4-i486-1_slack14.0.txz\n\nUpdated package for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/ntp-4.2.8p4-x86_64-1_slack14.0.txz\n\nUpdated package for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/ntp-4.2.8p4-i486-1_slack14.1.txz\n\nUpdated package for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/ntp-4.2.8p4-x86_64-1_slack14.1.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/ntp-4.2.8p4-i586-1.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/ntp-4.2.8p4-x86_64-1.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 13.0 package:\n21dd14178fea17a88c9326c8672ecefd ntp-4.2.8p4-i486-1_slack13.0.txz\n\nSlackware x86_64 13.0 package:\n8647479b2007b92ff8598184f2275263 ntp-4.2.8p4-x86_64-1_slack13.0.txz\n\nSlackware 13.1 package:\ne0f122e8e271dc84db06202c03cc0288 ntp-4.2.8p4-i486-1_slack13.1.txz\n\nSlackware x86_64 13.1 package:\ndb0aff04b72b3d8c96ca8c8e1ed36c05 ntp-4.2.8p4-x86_64-1_slack13.1.txz\n\nSlackware 13.37 package:\n5914e43e886e5ff88fefd30083493e30 ntp-4.2.8p4-i486-1_slack13.37.txz\n\nSlackware x86_64 13.37 package:\n4335c3bf2ae24afc5ad734e8d80b3e94 ntp-4.2.8p4-x86_64-1_slack13.37.txz\n\nSlackware 14.0 package:\n39b05698797b638b67130e0b170e0a4b ntp-4.2.8p4-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 package:\ndcf4a56ba1d013ee1c9d0e624e158709 ntp-4.2.8p4-x86_64-1_slack14.0.txz\n\nSlackware 14.1 package:\n1fd3a7beaf23303e2c211af377662614 ntp-4.2.8p4-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 package:\n438c3185aa8ec20d1c2b5e51786e4d41 ntp-4.2.8p4-x86_64-1_slack14.1.txz\n\nSlackware -current package:\n81bfb2fed450cb26a51b5e1cee0d33ed n/ntp-4.2.8p4-i586-1.txz\n\nSlackware x86_64 -current package:\n8bae4ad633af40d4d54b7686e4b225f9 n/ntp-4.2.8p4-x86_64-1.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the package as root:\n# upgradepkg ntp-4.2.8p4-i486-1_slack14.1.txz\n\nThen, restart the NTP daemon:\n\n# sh /etc/rc.d/rc.ntpd restart\n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list: |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message: |\n| |\n| unsubscribe slackware-security |\n| |\n| You will get a confirmation message back containing instructions to |\n| complete the process. Please do not reply to this email address", "sources": [ { "db": "NVD", "id": "CVE-2015-7704" }, { "db": "CERT/CC", "id": "VU#718152" }, { "db": "JVNDB", "id": "JVNDB-2015-007700" }, { "db": "BID", "id": "77280" }, { "db": "BID", "id": "92012" }, { "db": "VULMON", "id": "CVE-2015-7704" }, { "db": "PACKETSTORM", "id": "134093" }, { "db": "PACKETSTORM", "id": "137992" }, { "db": "PACKETSTORM", "id": "138803" }, { "db": "PACKETSTORM", "id": "134082" }, { "db": "PACKETSTORM", "id": "136864" }, { "db": "PACKETSTORM", "id": "134102" }, { "db": "PACKETSTORM", "id": "134034" }, { "db": "PACKETSTORM", "id": "134162" }, { "db": "PACKETSTORM", "id": "134137" } ], "trust": 3.78 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-7704", "trust": 3.7 }, { "db": "CERT/CC", "id": "VU#718152", "trust": 3.6 }, { "db": "BID", "id": "77280", "trust": 2.0 }, { "db": "SECTRACK", "id": "1033951", "trust": 1.7 }, { "db": "MCAFEE", "id": "SB10284", "trust": 1.7 }, { "db": "JVN", "id": "JVNVU91176422", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-007700", "trust": 0.8 }, { "db": "MCAFEE", "id": "SB10164", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201510-585", "trust": 0.6 }, { "db": "JUNIPER", "id": "JSA10711", "trust": 0.3 }, { "db": "ICS CERT", "id": "ICSA-17-094-04", "trust": 0.3 }, { "db": "BID", "id": "92012", "trust": 0.3 }, { "db": "ICS CERT", "id": "ICSA-15-356-01", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2015-7704", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "134093", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "137992", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "138803", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "134082", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "136864", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "134102", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "134034", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "134162", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "134137", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#718152" }, { "db": "VULMON", "id": "CVE-2015-7704" }, { "db": "BID", "id": "77280" }, { "db": "BID", "id": "92012" }, { "db": "JVNDB", "id": "JVNDB-2015-007700" }, { "db": "PACKETSTORM", "id": "134093" }, { "db": "PACKETSTORM", "id": "137992" }, { "db": "PACKETSTORM", "id": "138803" }, { "db": "PACKETSTORM", "id": "134082" }, { "db": "PACKETSTORM", "id": "136864" }, { "db": "PACKETSTORM", "id": "134102" }, { "db": "PACKETSTORM", "id": "134034" }, { "db": "PACKETSTORM", "id": "134162" }, { "db": "PACKETSTORM", "id": "134137" }, { "db": "CNNVD", "id": "CNNVD-201510-585" }, { "db": "NVD", "id": "CVE-2015-7704" } ] }, "id": "VAR-201708-1547", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.33987721 }, "last_update_date": "2024-07-23T21:56:47.739000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HPSBHF03646", "trust": 0.8, "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05270839" }, { "title": "Bug 2901", "trust": 0.8, "url": "http://bugs.ntp.org/show_bug.cgi?id=2901" }, { "title": "Bug 1271070", "trust": 0.8, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271070" }, { "title": "NTP Bug 2901", "trust": 0.8, "url": "http://support.ntp.org/bin/view/main/ntpbug2901" }, { "title": "October 2015 NTP-4.2.8p4 Security Vulnerability Announcement (Medium)", "trust": 0.8, "url": "http://support.ntp.org/bin/view/main/securitynotice#october_2015_ntp_4_2_8p4_securit" }, { "title": "NTP Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=119777" }, { "title": "Red Hat: Important: ntp security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20152520 - security advisory" }, { "title": "Red Hat: CVE-2015-7704", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=cve-2015-7704" }, { "title": "Amazon Linux AMI: ALAS-2015-607", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=alas-2015-607" }, { "title": "Ubuntu Security Notice: ntp vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-2783-1" }, { "title": "Citrix Security Bulletins: Citrix XenServer Multiple Security Updates", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=089f3f781342f5003697826b78ce46a9" }, { "title": "Debian Security Advisories: DSA-3388-1 ntp -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=61fe4252a877d02aaea1c931efa0a305" }, { "title": "Symantec Security Advisories: SA103 : October 2015 NTP Security Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories\u0026qid=f5e05389a60d3a56f2a0ad0ec21579d9" }, { "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - October 2015", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=435ed9abc2fb1e74ce2a69605a01e326" }, { "title": "Cisco: Multiple Vulnerabilities in ntpd Affecting Cisco Products - October 2015", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20151021-ntp" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - January 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=eb439566c9130adc92d21bc093204cf8" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - April 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=976a4da35d55283870dbb31b88a6c655" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - July 2016", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=3a04485ebb79f7fbc2472bf9af5ce489" } ], "sources": [ { "db": "VULMON", "id": "CVE-2015-7704" }, { "db": "JVNDB", "id": "JVNDB-2015-007700" }, { "db": "CNNVD", "id": "CNNVD-201510-585" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-007700" }, { "db": "NVD", "id": "CVE-2015-7704" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "https://www.kb.cert.org/vuls/id/718152" }, { "trust": 2.1, "url": "https://www.cs.bu.edu/~goldbe/ntpattack.html" }, { "trust": 2.1, "url": "http://rhn.redhat.com/errata/rhsa-2015-1930.html" }, { "trust": 2.0, "url": "https://support.citrix.com/article/ctx220112" }, { "trust": 1.8, "url": "https://security.gentoo.org/glsa/201607-15" }, { "trust": 1.7, "url": "https://eprint.iacr.org/2015/1020.pdf" }, { "trust": 1.7, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271070" }, { "trust": 1.7, "url": "http://support.ntp.org/bin/view/main/securitynotice#october_2015_ntp_4_2_8p4_securit" }, { "trust": 1.7, "url": "http://support.ntp.org/bin/view/main/ntpbug2901" }, { "trust": 1.7, "url": "http://bugs.ntp.org/show_bug.cgi?id=2901" }, { "trust": 1.7, "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c05270839" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/77280" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1033951" }, { "trust": 1.7, "url": "http://www.debian.org/security/2015/dsa-3388" }, { "trust": 1.7, "url": "https://security.netapp.com/advisory/ntap-20171004-0002/" }, { "trust": 1.7, "url": "https://security.netapp.com/advisory/ntap-20171004-0001/" }, { "trust": 1.7, "url": "http://rhn.redhat.com/errata/rhsa-2015-2520.html" }, { "trust": 1.7, "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "trust": 1.7, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10284" }, { "trust": 1.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7704" }, { "trust": 1.6, "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016" }, { "trust": 1.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7704" }, { "trust": 0.8, "url": "http://support.ntp.org/bin/view/main/securitynotice#april_2016_ntp_4_2_8p7_security" }, { "trust": 0.8, "url": "http://support.ntp.org/bin/view/main/securitynotice#january_2016_ntp_4_2_8p6_securit" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu91176422/" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7871" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7855" }, { "trust": 0.6, "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html" }, { "trust": 0.6, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10164" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7702" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7852" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7701" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7850" }, { "trust": 0.5, "url": "http://support.ntp.org/bin/view/main/securitynotice#recent_vulnerabilities" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7705" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7703" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7691" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7853" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7692" }, { "trust": 0.4, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20151021-ntp" }, { "trust": 0.4, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c05270839" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7848" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7849" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7854" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7851" }, { "trust": 0.3, "url": "https://github.com/ntp-project/ntp/blob/stable/news#l295" }, { "trust": 0.3, "url": "http://www.ntp.org" }, { "trust": 0.3, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10711" }, { "trust": 0.3, "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-094-04" }, { "trust": 0.3, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160428-ntpd" }, { "trust": 0.3, "url": "http://learn.extremenetworks.com/rs/641-vmv-602/images/vn-2015-009_multiple_ntp_vulnerabilities.pdf" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/oct/113" }, { "trust": 0.3, "url": "isg3t1023874" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1023885" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1024073" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1023874" }, { "trust": 0.3, "url": "http://support.ntp.org/bin/view/main/ntpbug2952" }, { "trust": 0.3, "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21981747" }, { "trust": 0.3, "url": "https://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5099260" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1005821" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21979393" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21980676" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21983501" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21983506" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=nas8n1021264" }, { "trust": 0.3, "url": "http://www.oracle.com/index.html" }, { "trust": 0.3, "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5300" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8138" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1547" }, { "trust": 0.2, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7702" }, { "trust": 0.2, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7851" }, { "trust": 0.2, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7701" }, { "trust": 0.2, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7855" }, { "trust": 0.2, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7852" }, { "trust": 0.2, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7850" }, { "trust": 0.2, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7854" }, { "trust": 0.2, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7849" }, { "trust": 0.2, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7853" }, { "trust": 0.2, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7871" }, { "trust": 0.2, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7848" }, { "trust": 0.2, "url": "http://slackware.com" }, { "trust": 0.2, "url": "http://slackware.com/gpg-key" }, { "trust": 0.2, "url": "http://osuosl.org)" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5219" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5194" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5146" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5195" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5196" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-9750" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2015:2520" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://ics-cert.us-cert.gov/advisories/icsa-15-356-01" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/2783-1/" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-5300" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-7704" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7702" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1549" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7849" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7852" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7978" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8140" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7978" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1551" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2516" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7975" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7973" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7979" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8139" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8158" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4954" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4956" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7973" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7853" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7704" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8140" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7974" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7691" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8139" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4957" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7703" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7855" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4955" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7705" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2517" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1548" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1547" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8158" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7854" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2519" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-2518" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7851" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7871" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7977" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7848" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7977" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-1550" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7850" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7701" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7692" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-8138" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7979" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7974" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4953" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7975" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2015-7976" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7976" }, { "trust": 0.1, "url": "http://www.hpe.com/support/security_bulletin_archive" }, { "trust": 0.1, "url": "https://www.hpe.com/info/report-security-vulnerability" }, { "trust": 0.1, "url": "https://h20564.www2.hpe.com/hpsc/doc/public/display?docid=emr_na-c01345499" }, { "trust": 0.1, "url": "http://www.hpe.com/support/subscriber_choice" }, { "trust": 0.1, "url": "https://security.freebsd.org/patches/sa-15:25/ntp-93.patch.asc" }, { "trust": 0.1, "url": "https://security.freebsd.org/advisories/freebsd-sa-15:25.ntp.asc" }, { "trust": 0.1, "url": "https://www.freebsd.org/handbook/makeworld.html." }, { "trust": 0.1, "url": "https://security.freebsd.org/patches/sa-15:25/ntp-102.patch.asc" }, { "trust": 0.1, "url": "https://security.freebsd.org/." }, { "trust": 0.1, "url": "https://svnweb.freebsd.org/base?view=revision\u0026revision=nnnnnn" }, { "trust": 0.1, "url": "https://security.freebsd.org/patches/sa-15:25/ntp-93.patch.bz2" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7703" }, { "trust": 0.1, "url": "https://security.freebsd.org/patches/sa-15:25/ntp-101.patch.bz2" }, { "trust": 0.1, "url": "https://security.freebsd.org/patches/sa-15:25/ntp-101.patch.asc" }, { "trust": 0.1, "url": "https://security.freebsd.org/patches/sa-15:25/ntp-102.patch.bz2" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2516" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1551" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1548" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2519" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2516" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2517" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2519" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1550" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1547" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-8138" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2518" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1549" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1551" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1550" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2518" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-2517" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1548" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1549" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-2783-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/ntp/1:4.2.6.p5+dfsg-3ubuntu8.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/ntp/1:4.2.6.p5+dfsg-3ubuntu2.14.04.5" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/ntp/1:4.2.6.p3+dfsg-1ubuntu3.6" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/ntp/1:4.2.6.p5+dfsg-3ubuntu6.2" }, { "trust": 0.1, "url": "http://gpgtools.org" }, { "trust": 0.1, "url": "http://talosintel.com/vulnerability-reports/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-9751" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3405" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7705" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7691" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5196" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-9750" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7692" } ], "sources": [ { "db": "CERT/CC", "id": "VU#718152" }, { "db": "VULMON", "id": "CVE-2015-7704" }, { "db": "BID", "id": "77280" }, { "db": "BID", "id": "92012" }, { "db": "JVNDB", "id": "JVNDB-2015-007700" }, { "db": "PACKETSTORM", "id": "134093" }, { "db": "PACKETSTORM", "id": "137992" }, { "db": "PACKETSTORM", "id": "138803" }, { "db": "PACKETSTORM", "id": "134082" }, { "db": "PACKETSTORM", "id": "136864" }, { "db": "PACKETSTORM", "id": "134102" }, { "db": "PACKETSTORM", "id": "134034" }, { "db": "PACKETSTORM", "id": "134162" }, { "db": "PACKETSTORM", "id": "134137" }, { "db": "CNNVD", "id": "CNNVD-201510-585" }, { "db": "NVD", "id": "CVE-2015-7704" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#718152" }, { "db": "VULMON", "id": "CVE-2015-7704" }, { "db": "BID", "id": "77280" }, { "db": "BID", "id": "92012" }, { "db": "JVNDB", "id": "JVNDB-2015-007700" }, { "db": "PACKETSTORM", "id": "134093" }, { "db": "PACKETSTORM", "id": "137992" }, { "db": "PACKETSTORM", "id": "138803" }, { "db": "PACKETSTORM", "id": "134082" }, { "db": "PACKETSTORM", "id": "136864" }, { "db": "PACKETSTORM", "id": "134102" }, { "db": "PACKETSTORM", "id": "134034" }, { "db": "PACKETSTORM", "id": "134162" }, { "db": "PACKETSTORM", "id": "134137" }, { "db": "CNNVD", "id": "CNNVD-201510-585" }, { "db": "NVD", "id": "CVE-2015-7704" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-04-27T00:00:00", "db": "CERT/CC", "id": "VU#718152" }, { "date": "2017-08-07T00:00:00", "db": "VULMON", "id": "CVE-2015-7704" }, { "date": "2015-10-21T00:00:00", "db": "BID", "id": "77280" }, { "date": "2016-07-19T00:00:00", "db": "BID", "id": "92012" }, { "date": "2017-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007700" }, { "date": "2015-10-27T03:38:46", "db": "PACKETSTORM", "id": "134093" }, { "date": "2016-07-21T15:56:23", "db": "PACKETSTORM", "id": "137992" }, { "date": "2016-09-21T17:24:00", "db": "PACKETSTORM", "id": "138803" }, { "date": "2015-10-26T19:32:22", "db": "PACKETSTORM", "id": "134082" }, { "date": "2016-05-02T21:38:58", "db": "PACKETSTORM", "id": "136864" }, { "date": "2015-10-27T23:30:50", "db": "PACKETSTORM", "id": "134102" }, { "date": "2015-10-21T19:22:22", "db": "PACKETSTORM", "id": "134034" }, { "date": "2015-11-02T16:48:39", "db": "PACKETSTORM", "id": "134162" }, { "date": "2015-10-30T23:22:57", "db": "PACKETSTORM", "id": "134137" }, { "date": "2015-10-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201510-585" }, { "date": "2017-08-07T20:29:00.683000", "db": "NVD", "id": "CVE-2015-7704" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-04-28T00:00:00", "db": "CERT/CC", "id": "VU#718152" }, { "date": "2020-06-18T00:00:00", "db": "VULMON", "id": "CVE-2015-7704" }, { "date": "2017-05-23T16:23:00", "db": "BID", "id": "77280" }, { "date": "2016-11-24T01:13:00", "db": "BID", "id": "92012" }, { "date": "2017-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-007700" }, { "date": "2021-11-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201510-585" }, { "date": "2021-11-17T22:15:44.397000", "db": "NVD", "id": "CVE-2015-7704" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "134093" }, { "db": "PACKETSTORM", "id": "134102" }, { "db": "PACKETSTORM", "id": "134034" }, { "db": "CNNVD", "id": "CNNVD-201510-585" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "NTP.org ntpd contains multiple vulnerabilities", "sources": [ { "db": "CERT/CC", "id": "VU#718152" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201510-585" } ], "trust": 0.6 } }
ghsa-jm9v-x8m5-p6p2
Vulnerability from github
The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted "KOD" messages.
{ "affected": [], "aliases": [ "CVE-2015-7704" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-08-07T20:29:00Z", "severity": "HIGH" }, "details": "The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted \"KOD\" messages.", "id": "GHSA-jm9v-x8m5-p6p2", "modified": "2022-05-13T01:05:10Z", "published": "2022-05-13T01:05:10Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7704" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271070" }, { "type": "WEB", "url": "https://eprint.iacr.org/2015/1020.pdf" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05270839" }, { "type": "WEB", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10284" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201607-15" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20171004-0001" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20171004-0002" }, { "type": "WEB", "url": "https://support.citrix.com/article/CTX220112" }, { "type": "WEB", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1212-security-advisory-0016" }, { "type": "WEB", "url": "https://www.cs.bu.edu/~goldbe/NTPattack.html" }, { "type": "WEB", "url": "https://www.kb.cert.org/vuls/id/718152" }, { "type": "WEB", "url": "http://bugs.ntp.org/show_bug.cgi?id=2901" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2015-1930.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2015-2520.html" }, { "type": "WEB", "url": "http://support.ntp.org/bin/view/Main/NtpBug2901" }, { "type": "WEB", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#October_2015_NTP_4_2_8p4_Securit" }, { "type": "WEB", "url": "http://www.debian.org/security/2015/dsa-3388" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/77280" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1033951" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.