Action not permitted
Modal body text goes here.
cve-2015-1799
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:54:16.094Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-3222", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3222" }, { "name": "20150408 Network Time Protocol Daemon Symmetric Mode Packet Processing Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38275" }, { "name": "[chrony-announce] 20150407 chrony-1.31.1 released (security)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-announce/2015/04/msg00002.html" }, { "name": "USN-2567-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2567-1" }, { "name": "VU#374268", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/374268" }, { "name": "73950", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/73950" }, { "name": "SSRT102029", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=143213867103400\u0026w=2" }, { "name": "FEDORA-2015-5761", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155864.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10114" }, { "name": "FEDORA-2015-5874", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155863.html" }, { "name": "APPLE-SA-2015-06-30-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html" }, { "name": "openSUSE-SU-2015:0775", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00052.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "GLSA-201509-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201509-01" }, { "name": "HPSBUX03333", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=143213867103400\u0026w=2" }, { "name": "MDVSA-2015:202", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:202" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT204942" }, { "name": "HPSBHF03557", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=145750740530849\u0026w=2" }, { "name": "RHSA-2015:1459", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1459.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.ntp.org/show_bug.cgi?id=2781" }, { "name": "20150408 Multiple Vulnerabilities in ntpd (April 2015) Affecting Cisco Products", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-ntpd" }, { "name": "DSA-3223", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3223" }, { "name": "1032031", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032031" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-04-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "DSA-3222", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3222" }, { "name": "20150408 Network Time Protocol Daemon Symmetric Mode Packet Processing Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38275" }, { "name": "[chrony-announce] 20150407 chrony-1.31.1 released (security)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-announce/2015/04/msg00002.html" }, { "name": "USN-2567-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2567-1" }, { "name": "VU#374268", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/374268" }, { "name": "73950", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/73950" }, { "name": "SSRT102029", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=143213867103400\u0026w=2" }, { "name": "FEDORA-2015-5761", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155864.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10114" }, { "name": "FEDORA-2015-5874", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155863.html" }, { "name": "APPLE-SA-2015-06-30-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html" }, { "name": "openSUSE-SU-2015:0775", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00052.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "GLSA-201509-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201509-01" }, { "name": "HPSBUX03333", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=143213867103400\u0026w=2" }, { "name": "MDVSA-2015:202", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:202" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT204942" }, { "name": "HPSBHF03557", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=145750740530849\u0026w=2" }, { "name": "RHSA-2015:1459", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1459.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.ntp.org/show_bug.cgi?id=2781" }, { "name": "20150408 Multiple Vulnerabilities in ntpd (April 2015) Affecting Cisco Products", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-ntpd" }, { "name": "DSA-3223", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3223" }, { "name": "1032031", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032031" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-1799", "datePublished": "2015-04-08T10:00:00", "dateReserved": "2015-02-17T00:00:00", "dateUpdated": "2024-08-06T04:54:16.094Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-1799\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2015-04-08T10:59:05.717\",\"lastModified\":\"2018-01-05T02:30:00.447\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer.\"},{\"lang\":\"es\",\"value\":\"La caracter\u00edstica symmetric-key en la funci\u00f3n receive en ntp_proto.c en ntpd en NTP 3.x y 4.x anterior a 4.2.8p2 realiza actualizaciones de las variables de estados al recibir ciertos paquetes inv\u00e1lidos, lo que facilita a atacantes man-in-the-middle causar una denegaci\u00f3n de servicio (perdida de sincronizaci\u00f3n) mediante la falsificaci\u00f3n de la direcci\u00f3n del IP de fuente de un par.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:M/Au:N/C:N/I:P/A:P\",\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":4.3},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":5.5,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-17\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.2.7p444\",\"matchCriteriaId\":\"E538FCAE-3E2C-4EA8-A74F-ABF47652C15C\"}]}]}],\"references\":[{\"url\":\"http://bugs.ntp.org/show_bug.cgi?id=2781\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-announce/2015/04/msg00002.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155863.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155864.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-04/msg00052.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=143213867103400\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=145750740530849\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1459.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.apple.com/kb/HT204942\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-ntpd\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://tools.cisco.com/security/center/viewAlert.x?alertId=38275\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2015/dsa-3222\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2015/dsa-3223\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.kb.cert.org/vuls/id/374268\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:202\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/73950\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id/1032031\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2567-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10114\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://security.gentoo.org/glsa/201509-01\",\"source\":\"secalert@redhat.com\"}]}}" } }
ghsa-q9p8-4cvj-q5fj
Vulnerability from github
The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer.
{ "affected": [], "aliases": [ "CVE-2015-1799" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2015-04-08T10:59:00Z", "severity": "MODERATE" }, "details": "The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer.", "id": "GHSA-q9p8-4cvj-q5fj", "modified": "2022-05-14T03:59:23Z", "published": "2022-05-14T03:59:23Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1799" }, { "type": "WEB", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10114" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201509-01" }, { "type": "WEB", "url": "http://bugs.ntp.org/show_bug.cgi?id=2781" }, { "type": "WEB", "url": "http://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-announce/2015/04/msg00002.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155863.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155864.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00052.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=143213867103400\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=145750740530849\u0026w=2" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2015-1459.html" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT204942" }, { "type": "WEB", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities" }, { "type": "WEB", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-ntpd" }, { "type": "WEB", "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38275" }, { "type": "WEB", "url": "http://www.debian.org/security/2015/dsa-3222" }, { "type": "WEB", "url": "http://www.debian.org/security/2015/dsa-3223" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/374268" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:202" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/73950" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1032031" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2567-1" } ], "schema_version": "1.4.0", "severity": [] }
rhsa-2015_1459
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated ntp packages that fix multiple security issues, several bugs, and\nadd two enhancements are now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The Network Time Protocol (NTP) is used to synchronize a computer\u0027s time\nwith another referenced time source.\n\nIt was found that because NTP\u0027s access control was based on a source IP\naddress, an attacker could bypass source IP restrictions and send malicious\ncontrol and configuration packets by spoofing ::1 addresses.\n(CVE-2014-9298)\n\nA denial of service flaw was found in the way NTP hosts that were peering\nwith each other authenticated themselves before updating their internal\nstate variables. An attacker could send packets to one peer host, which\ncould cascade to other peers, and stop the synchronization process among\nthe reached peers. (CVE-2015-1799)\n\nA flaw was found in the way the ntp-keygen utility generated MD5 symmetric\nkeys on big-endian systems. An attacker could possibly use this flaw to\nguess generated MD5 keys, which could then be used to spoof an NTP client\nor server. (CVE-2015-3405)\n\nA stack-based buffer overflow was found in the way the NTP autokey protocol\nwas implemented. When an NTP client decrypted a secret received from an NTP\nserver, it could cause that client to crash. (CVE-2014-9297)\n\nIt was found that ntpd did not check whether a Message Authentication Code\n(MAC) was present in a received packet when ntpd was configured to use\nsymmetric cryptographic keys. A man-in-the-middle attacker could use this\nflaw to send crafted packets that would be accepted by a client or a peer\nwithout the attacker knowing the symmetric key. (CVE-2015-1798)\n\nThe CVE-2015-1798 and CVE-2015-1799 issues were discovered by Miroslav\nLichv\u00e1r of Red Hat.\n\nBug fixes:\n\n* The ntpd daemon truncated symmetric keys specified in the key file to 20\nbytes. As a consequence, it was impossible to configure NTP authentication\nto work with peers that use longer keys. The maximum length of keys has now\nbeen changed to 32 bytes. (BZ#1053551)\n\n* The ntp-keygen utility used the exponent of 3 when generating RSA keys,\nand generating RSA keys failed when FIPS mode was enabled. ntp-keygen has\nbeen modified to use the exponent of 65537, and generating keys in FIPS\nmode now works as expected. (BZ#1184421)\n\n* The ntpd daemon included a root delay when calculating its root\ndispersion. Consequently, the NTP server reported larger root dispersion\nthan it should have and clients could reject the source when its distance\nreached the maximum synchronization distance (1.5 seconds by default).\nCalculation of root dispersion has been fixed, the root dispersion is now\nreported correctly, and clients no longer reject the server due to a large\nsynchronization distance. (BZ#1045376)\n\n* The ntpd daemon dropped incoming NTP packets if their source port was\nlower than 123 (the NTP port). Clients behind Network Address Translation\n(NAT) were unable to synchronize with the server if their source port was\ntranslated to ports below 123. With this update, ntpd no longer checks the\nsource port number. (BZ#1171630)\n\nEnhancements:\n\n* This update introduces configurable access of memory segments used for\nShared Memory Driver (SHM) reference clocks. Previously, only the first two\nmemory segments were created with owner-only access, allowing just two SHM\nreference clocks to be used securely on a system. Now, the owner-only\naccess to SHM is configurable with the \"mode\" option, and it is therefore\npossible to use more SHM reference clocks securely. (BZ#1122015)\n\n* Support for nanosecond resolution has been added to the SHM reference\nclock. Prior to this update, when a Precision Time Protocol (PTP) hardware\nclock was used as a time source to synchronize the system clock (for\nexample, with the timemaster service from the linuxptp package), the\naccuracy of the synchronization was limited due to the microsecond\nresolution of the SHM protocol. The nanosecond extension in the SHM\nprotocol now enables sub-microsecond synchronization of the system clock.\n(BZ#1117704)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:1459", "url": "https://access.redhat.com/errata/RHSA-2015:1459" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "995134", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=995134" }, { "category": "external", "summary": "1045376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1045376" }, { "category": "external", "summary": "1117704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1117704" }, { "category": "external", "summary": "1122015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1122015" }, { "category": "external", "summary": "1165141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1165141" }, { "category": "external", "summary": "1166596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1166596" }, { "category": "external", "summary": "1171630", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171630" }, { "category": "external", "summary": "1184572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184572" }, { "category": "external", "summary": "1184573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184573" }, { "category": "external", "summary": "1190619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1190619" }, { "category": "external", "summary": "1193849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1193849" }, { "category": "external", "summary": "1193850", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1193850" }, { "category": "external", "summary": "1199430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199430" }, { "category": "external", "summary": "1199435", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199435" }, { "category": "external", "summary": "1210324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210324" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_1459.json" } ], "title": "Red Hat Security Advisory: ntp security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-05T18:57:20+00:00", "generator": { "date": "2024-11-05T18:57:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2015:1459", "initial_release_date": "2015-07-21T10:15:04+00:00", "revision_history": [ { "date": "2015-07-21T10:15:04+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-07-21T10:15:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T18:57:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6.x86_64", "product": { "name": "ntpdate-0:4.2.6p5-5.el6.x86_64", "product_id": "ntpdate-0:4.2.6p5-5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6.x86_64", "product": { "name": "ntp-0:4.2.6p5-5.el6.x86_64", "product_id": "ntp-0:4.2.6p5-5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6.x86_64", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6.x86_64", "product_id": "ntp-perl-0:4.2.6p5-5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6.i686", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.i686", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6?arch=i686" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6.i686", "product": { "name": "ntp-0:4.2.6p5-5.el6.i686", "product_id": "ntp-0:4.2.6p5-5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6?arch=i686" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6.i686", "product": { "name": "ntpdate-0:4.2.6p5-5.el6.i686", "product_id": "ntpdate-0:4.2.6p5-5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6?arch=i686" } } }, { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6.i686", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6.i686", "product_id": "ntp-perl-0:4.2.6p5-5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6.src", "product": { "name": "ntp-0:4.2.6p5-5.el6.src", "product_id": "ntp-0:4.2.6p5-5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6.s390x", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6.s390x", "product_id": "ntp-perl-0:4.2.6p5-5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6?arch=s390x" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6?arch=s390x" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6.s390x", "product": { "name": "ntp-0:4.2.6p5-5.el6.s390x", "product_id": "ntp-0:4.2.6p5-5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6?arch=s390x" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6.s390x", "product": { "name": "ntpdate-0:4.2.6p5-5.el6.s390x", "product_id": "ntpdate-0:4.2.6p5-5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ntp-doc-0:4.2.6p5-5.el6.noarch", "product": { "name": "ntp-doc-0:4.2.6p5-5.el6.noarch", "product_id": "ntp-doc-0:4.2.6p5-5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-doc@4.2.6p5-5.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-5.el6.ppc64", "product": { "name": "ntp-perl-0:4.2.6p5-5.el6.ppc64", "product_id": "ntp-perl-0:4.2.6p5-5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "product_id": "ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-5.el6.ppc64", "product": { "name": "ntpdate-0:4.2.6p5-5.el6.ppc64", "product_id": "ntpdate-0:4.2.6p5-5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-5.el6?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-5.el6.ppc64", "product": { "name": "ntp-0:4.2.6p5-5.el6.ppc64", "product_id": "ntp-0:4.2.6p5-5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-5.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ntp-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ntp-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ntp-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ntp-0:4.2.6p5-5.el6.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6.src", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ntp-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ntp-doc-0:4.2.6p5-5.el6.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6.noarch", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ntpdate-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ntpdate-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ntpdate-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:ntpdate-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ntp-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ntp-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ntp-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ntp-0:4.2.6p5-5.el6.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6.src", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ntp-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ntp-doc-0:4.2.6p5-5.el6.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6.noarch", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ntp-perl-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ntp-perl-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ntp-perl-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ntp-perl-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ntpdate-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ntpdate-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ntpdate-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:ntpdate-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6.src", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ntp-doc-0:4.2.6p5-5.el6.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ntp-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ntp-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ntp-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ntp-0:4.2.6p5-5.el6.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6.src", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ntp-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ntp-doc-0:4.2.6p5-5.el6.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6.noarch", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:ntp-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:ntp-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:ntp-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:ntp-0:4.2.6p5-5.el6.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6.src", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:ntp-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:ntp-doc-0:4.2.6p5-5.el6.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6.noarch", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:ntpdate-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:ntpdate-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:ntpdate-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:ntpdate-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ntp-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ntp-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ntp-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ntp-0:4.2.6p5-5.el6.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ntp-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ntp-doc-0:4.2.6p5-5.el6.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ntp-perl-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ntp-perl-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ntp-perl-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ntp-perl-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ntpdate-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ntpdate-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ntpdate-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:ntpdate-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:ntp-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:ntp-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:ntp-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:ntp-0:4.2.6p5-5.el6.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6.src", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:ntp-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:ntp-doc-0:4.2.6p5-5.el6.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6.noarch", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ntp-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntp-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ntp-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntp-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ntp-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntp-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ntp-0:4.2.6p5-5.el6.src" }, "product_reference": "ntp-0:4.2.6p5-5.el6.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ntp-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntp-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-5.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ntp-doc-0:4.2.6p5-5.el6.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-5.el6.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ntp-perl-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ntp-perl-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ntp-perl-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ntp-perl-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntp-perl-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ntpdate-0:4.2.6p5-5.el6.i686" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ntpdate-0:4.2.6p5-5.el6.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ntpdate-0:4.2.6p5-5.el6.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:ntpdate-0:4.2.6p5-5.el6.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-5.el6.x86_64", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9297", "discovery_date": "2015-01-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1184573" } ], "notes": [ { "category": "description", "text": "A stack-based buffer overflow was found in the way the NTP autokey protocol was implemented. When an NTP client decrypted a secret received from an NTP server, it could cause that client to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: vallen in extension fields are not validated", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of ntp as shipped with Red Hat Enterprise Linux 5.\n\nRed Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nA mitigation for Red Hat Enterprise Linux 6 and 7 is available at: https://bugzilla.redhat.com/show_bug.cgi?id=1184573#c16", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:ntp-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-0:4.2.6p5-5.el6.src", "6Client-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-0:4.2.6p5-5.el6.i686", "6Client:ntp-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-0:4.2.6p5-5.el6.s390x", "6Client:ntp-0:4.2.6p5-5.el6.src", "6Client:ntp-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client:ntpdate-0:4.2.6p5-5.el6.i686", "6Client:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-0:4.2.6p5-5.el6.src", "6Server-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-0:4.2.6p5-5.el6.i686", "6Server:ntp-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-0:4.2.6p5-5.el6.s390x", "6Server:ntp-0:4.2.6p5-5.el6.src", "6Server:ntp-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server:ntpdate-0:4.2.6p5-5.el6.i686", "6Server:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.src", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-0:4.2.6p5-5.el6.src", "6Workstation:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation:ntpdate-0:4.2.6p5-5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-9297" }, { "category": "external", "summary": "RHBZ#1184573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184573" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-9297", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9297" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-9297", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9297" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#vallen_is_not_validated_in_sever", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#vallen_is_not_validated_in_sever" } ], "release_date": "2015-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-07-21T10:15:04+00:00", "details": "All ntp users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add these\nenhancements. After installing the update, the ntpd daemon will\nrestart automatically.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-optional:ntp-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-0:4.2.6p5-5.el6.src", "6Client-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-0:4.2.6p5-5.el6.i686", "6Client:ntp-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-0:4.2.6p5-5.el6.s390x", "6Client:ntp-0:4.2.6p5-5.el6.src", "6Client:ntp-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client:ntpdate-0:4.2.6p5-5.el6.i686", "6Client:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-0:4.2.6p5-5.el6.src", "6Server-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-0:4.2.6p5-5.el6.i686", "6Server:ntp-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-0:4.2.6p5-5.el6.s390x", "6Server:ntp-0:4.2.6p5-5.el6.src", "6Server:ntp-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server:ntpdate-0:4.2.6p5-5.el6.i686", "6Server:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.src", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-0:4.2.6p5-5.el6.src", "6Workstation:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation:ntpdate-0:4.2.6p5-5.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1459" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-optional:ntp-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-0:4.2.6p5-5.el6.src", "6Client-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-0:4.2.6p5-5.el6.i686", "6Client:ntp-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-0:4.2.6p5-5.el6.s390x", "6Client:ntp-0:4.2.6p5-5.el6.src", "6Client:ntp-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client:ntpdate-0:4.2.6p5-5.el6.i686", "6Client:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-0:4.2.6p5-5.el6.src", "6Server-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-0:4.2.6p5-5.el6.i686", "6Server:ntp-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-0:4.2.6p5-5.el6.s390x", "6Server:ntp-0:4.2.6p5-5.el6.src", "6Server:ntp-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server:ntpdate-0:4.2.6p5-5.el6.i686", "6Server:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.src", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-0:4.2.6p5-5.el6.src", "6Workstation:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation:ntpdate-0:4.2.6p5-5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "ntp: vallen in extension fields are not validated" }, { "cve": "CVE-2014-9298", "discovery_date": "2015-01-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1184572" } ], "notes": [ { "category": "description", "text": "It was found that because NTP\u0027s access control was based on a source IP address, an attacker could bypass source IP restrictions and send malicious control and configuration packets by spoofing ::1 addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: drop packets with source address ::1", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of ntp as shipped with Red Hat Enterprise Linux 5.\n\nRed Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nTo mitigate this issue, you may use the ip6tables command to prevent spoofing of local addresses on any network interface other than the loopback interface. Refer to the Mitigation section on our KBase article: https://access.redhat.com/articles/1305723", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:ntp-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-0:4.2.6p5-5.el6.src", "6Client-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-0:4.2.6p5-5.el6.i686", "6Client:ntp-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-0:4.2.6p5-5.el6.s390x", "6Client:ntp-0:4.2.6p5-5.el6.src", "6Client:ntp-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client:ntpdate-0:4.2.6p5-5.el6.i686", "6Client:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-0:4.2.6p5-5.el6.src", "6Server-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-0:4.2.6p5-5.el6.i686", "6Server:ntp-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-0:4.2.6p5-5.el6.s390x", "6Server:ntp-0:4.2.6p5-5.el6.src", "6Server:ntp-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server:ntpdate-0:4.2.6p5-5.el6.i686", "6Server:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.src", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-0:4.2.6p5-5.el6.src", "6Workstation:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation:ntpdate-0:4.2.6p5-5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-9298" }, { "category": "external", "summary": "RHBZ#1184572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184572" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-9298", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9298" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-9298", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9298" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#1_can_be_spoofed_on_some_OSes_so", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#1_can_be_spoofed_on_some_OSes_so" } ], "release_date": "2015-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-07-21T10:15:04+00:00", "details": "All ntp users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add these\nenhancements. After installing the update, the ntpd daemon will\nrestart automatically.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-optional:ntp-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-0:4.2.6p5-5.el6.src", "6Client-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-0:4.2.6p5-5.el6.i686", "6Client:ntp-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-0:4.2.6p5-5.el6.s390x", "6Client:ntp-0:4.2.6p5-5.el6.src", "6Client:ntp-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client:ntpdate-0:4.2.6p5-5.el6.i686", "6Client:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-0:4.2.6p5-5.el6.src", "6Server-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-0:4.2.6p5-5.el6.i686", "6Server:ntp-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-0:4.2.6p5-5.el6.s390x", "6Server:ntp-0:4.2.6p5-5.el6.src", "6Server:ntp-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server:ntpdate-0:4.2.6p5-5.el6.i686", "6Server:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.src", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-0:4.2.6p5-5.el6.src", "6Workstation:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation:ntpdate-0:4.2.6p5-5.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1459" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-optional:ntp-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-0:4.2.6p5-5.el6.src", "6Client-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-0:4.2.6p5-5.el6.i686", "6Client:ntp-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-0:4.2.6p5-5.el6.s390x", "6Client:ntp-0:4.2.6p5-5.el6.src", "6Client:ntp-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client:ntpdate-0:4.2.6p5-5.el6.i686", "6Client:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-0:4.2.6p5-5.el6.src", "6Server-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-0:4.2.6p5-5.el6.i686", "6Server:ntp-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-0:4.2.6p5-5.el6.s390x", "6Server:ntp-0:4.2.6p5-5.el6.src", "6Server:ntp-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server:ntpdate-0:4.2.6p5-5.el6.i686", "6Server:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.src", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-0:4.2.6p5-5.el6.src", "6Workstation:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation:ntpdate-0:4.2.6p5-5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: drop packets with source address ::1" }, { "cve": "CVE-2014-9750", "discovery_date": "2015-01-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1184573" } ], "notes": [ { "category": "description", "text": "A stack-based buffer overflow was found in the way the NTP autokey protocol was implemented. When an NTP client decrypted a secret received from an NTP server, it could cause that client to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: vallen in extension fields are not validated", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of ntp as shipped with Red Hat Enterprise Linux 5.\n\nRed Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nA mitigation for Red Hat Enterprise Linux 6 and 7 is available at: https://bugzilla.redhat.com/show_bug.cgi?id=1184573#c16", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:ntp-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-0:4.2.6p5-5.el6.src", "6Client-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-0:4.2.6p5-5.el6.i686", "6Client:ntp-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-0:4.2.6p5-5.el6.s390x", "6Client:ntp-0:4.2.6p5-5.el6.src", "6Client:ntp-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client:ntpdate-0:4.2.6p5-5.el6.i686", "6Client:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-0:4.2.6p5-5.el6.src", "6Server-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-0:4.2.6p5-5.el6.i686", "6Server:ntp-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-0:4.2.6p5-5.el6.s390x", "6Server:ntp-0:4.2.6p5-5.el6.src", "6Server:ntp-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server:ntpdate-0:4.2.6p5-5.el6.i686", "6Server:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.src", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-0:4.2.6p5-5.el6.src", "6Workstation:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation:ntpdate-0:4.2.6p5-5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-9750" }, { "category": "external", "summary": "RHBZ#1184573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184573" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-9750", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-9750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9750" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#vallen_is_not_validated_in_sever", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#vallen_is_not_validated_in_sever" } ], "release_date": "2015-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-07-21T10:15:04+00:00", "details": "All ntp users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add these\nenhancements. After installing the update, the ntpd daemon will\nrestart automatically.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-optional:ntp-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-0:4.2.6p5-5.el6.src", "6Client-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-0:4.2.6p5-5.el6.i686", "6Client:ntp-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-0:4.2.6p5-5.el6.s390x", "6Client:ntp-0:4.2.6p5-5.el6.src", "6Client:ntp-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client:ntpdate-0:4.2.6p5-5.el6.i686", "6Client:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-0:4.2.6p5-5.el6.src", "6Server-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-0:4.2.6p5-5.el6.i686", "6Server:ntp-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-0:4.2.6p5-5.el6.s390x", "6Server:ntp-0:4.2.6p5-5.el6.src", "6Server:ntp-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server:ntpdate-0:4.2.6p5-5.el6.i686", "6Server:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.src", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-0:4.2.6p5-5.el6.src", "6Workstation:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation:ntpdate-0:4.2.6p5-5.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1459" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-optional:ntp-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-0:4.2.6p5-5.el6.src", "6Client-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-0:4.2.6p5-5.el6.i686", "6Client:ntp-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-0:4.2.6p5-5.el6.s390x", "6Client:ntp-0:4.2.6p5-5.el6.src", "6Client:ntp-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client:ntpdate-0:4.2.6p5-5.el6.i686", "6Client:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-0:4.2.6p5-5.el6.src", "6Server-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-0:4.2.6p5-5.el6.i686", "6Server:ntp-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-0:4.2.6p5-5.el6.s390x", "6Server:ntp-0:4.2.6p5-5.el6.src", "6Server:ntp-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server:ntpdate-0:4.2.6p5-5.el6.i686", "6Server:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.src", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-0:4.2.6p5-5.el6.src", "6Workstation:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation:ntpdate-0:4.2.6p5-5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "ntp: vallen in extension fields are not validated" }, { "cve": "CVE-2014-9751", "discovery_date": "2015-01-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1184572" } ], "notes": [ { "category": "description", "text": "It was found that because NTP\u0027s access control was based on a source IP address, an attacker could bypass source IP restrictions and send malicious control and configuration packets by spoofing ::1 addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: drop packets with source address ::1", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of ntp as shipped with Red Hat Enterprise Linux 5.\n\nRed Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nTo mitigate this issue, you may use the ip6tables command to prevent spoofing of local addresses on any network interface other than the loopback interface. Refer to the Mitigation section on our KBase article: https://access.redhat.com/articles/1305723", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:ntp-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-0:4.2.6p5-5.el6.src", "6Client-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-0:4.2.6p5-5.el6.i686", "6Client:ntp-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-0:4.2.6p5-5.el6.s390x", "6Client:ntp-0:4.2.6p5-5.el6.src", "6Client:ntp-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client:ntpdate-0:4.2.6p5-5.el6.i686", "6Client:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-0:4.2.6p5-5.el6.src", "6Server-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-0:4.2.6p5-5.el6.i686", "6Server:ntp-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-0:4.2.6p5-5.el6.s390x", "6Server:ntp-0:4.2.6p5-5.el6.src", "6Server:ntp-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server:ntpdate-0:4.2.6p5-5.el6.i686", "6Server:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.src", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-0:4.2.6p5-5.el6.src", "6Workstation:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation:ntpdate-0:4.2.6p5-5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-9751" }, { "category": "external", "summary": "RHBZ#1184572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184572" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-9751", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9751" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-9751", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9751" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#1_can_be_spoofed_on_some_OSes_so", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#1_can_be_spoofed_on_some_OSes_so" } ], "release_date": "2015-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-07-21T10:15:04+00:00", "details": "All ntp users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add these\nenhancements. After installing the update, the ntpd daemon will\nrestart automatically.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-optional:ntp-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-0:4.2.6p5-5.el6.src", "6Client-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-0:4.2.6p5-5.el6.i686", "6Client:ntp-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-0:4.2.6p5-5.el6.s390x", "6Client:ntp-0:4.2.6p5-5.el6.src", "6Client:ntp-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client:ntpdate-0:4.2.6p5-5.el6.i686", "6Client:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-0:4.2.6p5-5.el6.src", "6Server-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-0:4.2.6p5-5.el6.i686", "6Server:ntp-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-0:4.2.6p5-5.el6.s390x", "6Server:ntp-0:4.2.6p5-5.el6.src", "6Server:ntp-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server:ntpdate-0:4.2.6p5-5.el6.i686", "6Server:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.src", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-0:4.2.6p5-5.el6.src", "6Workstation:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation:ntpdate-0:4.2.6p5-5.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1459" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-optional:ntp-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-0:4.2.6p5-5.el6.src", "6Client-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-0:4.2.6p5-5.el6.i686", "6Client:ntp-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-0:4.2.6p5-5.el6.s390x", "6Client:ntp-0:4.2.6p5-5.el6.src", "6Client:ntp-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client:ntpdate-0:4.2.6p5-5.el6.i686", "6Client:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-0:4.2.6p5-5.el6.src", "6Server-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-0:4.2.6p5-5.el6.i686", "6Server:ntp-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-0:4.2.6p5-5.el6.s390x", "6Server:ntp-0:4.2.6p5-5.el6.src", "6Server:ntp-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server:ntpdate-0:4.2.6p5-5.el6.i686", "6Server:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.src", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-0:4.2.6p5-5.el6.src", "6Workstation:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation:ntpdate-0:4.2.6p5-5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: drop packets with source address ::1" }, { "acknowledgments": [ { "names": [ "Miroslav Lichv\u00e1r" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2015-1798", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "discovery_date": "2015-03-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1199430" } ], "notes": [ { "category": "description", "text": "It was found that ntpd did not check whether a Message Authentication Code (MAC) was present in a received packet when ntpd was configured to use symmetric cryptographic keys. A man-in-the-middle attacker could use this flaw to send crafted packets that would be accepted by a client or a peer without the attacker knowing the symmetric key.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: ntpd accepts unauthenticated packets with symmetric key crypto", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of ntp as shipped with Red Hat Enterprise Linux 5", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:ntp-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-0:4.2.6p5-5.el6.src", "6Client-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-0:4.2.6p5-5.el6.i686", "6Client:ntp-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-0:4.2.6p5-5.el6.s390x", "6Client:ntp-0:4.2.6p5-5.el6.src", "6Client:ntp-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client:ntpdate-0:4.2.6p5-5.el6.i686", "6Client:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-0:4.2.6p5-5.el6.src", "6Server-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-0:4.2.6p5-5.el6.i686", "6Server:ntp-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-0:4.2.6p5-5.el6.s390x", "6Server:ntp-0:4.2.6p5-5.el6.src", "6Server:ntp-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server:ntpdate-0:4.2.6p5-5.el6.i686", "6Server:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.src", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-0:4.2.6p5-5.el6.src", "6Workstation:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation:ntpdate-0:4.2.6p5-5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1798" }, { "category": "external", "summary": "RHBZ#1199430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199430" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1798", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1798" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1798", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1798" } ], "release_date": "2015-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-07-21T10:15:04+00:00", "details": "All ntp users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add these\nenhancements. After installing the update, the ntpd daemon will\nrestart automatically.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-optional:ntp-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-0:4.2.6p5-5.el6.src", "6Client-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-0:4.2.6p5-5.el6.i686", "6Client:ntp-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-0:4.2.6p5-5.el6.s390x", "6Client:ntp-0:4.2.6p5-5.el6.src", "6Client:ntp-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client:ntpdate-0:4.2.6p5-5.el6.i686", "6Client:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-0:4.2.6p5-5.el6.src", "6Server-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-0:4.2.6p5-5.el6.i686", "6Server:ntp-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-0:4.2.6p5-5.el6.s390x", "6Server:ntp-0:4.2.6p5-5.el6.src", "6Server:ntp-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server:ntpdate-0:4.2.6p5-5.el6.i686", "6Server:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.src", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-0:4.2.6p5-5.el6.src", "6Workstation:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation:ntpdate-0:4.2.6p5-5.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1459" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Client-optional:ntp-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-0:4.2.6p5-5.el6.src", "6Client-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-0:4.2.6p5-5.el6.i686", "6Client:ntp-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-0:4.2.6p5-5.el6.s390x", "6Client:ntp-0:4.2.6p5-5.el6.src", "6Client:ntp-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client:ntpdate-0:4.2.6p5-5.el6.i686", "6Client:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-0:4.2.6p5-5.el6.src", "6Server-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-0:4.2.6p5-5.el6.i686", "6Server:ntp-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-0:4.2.6p5-5.el6.s390x", "6Server:ntp-0:4.2.6p5-5.el6.src", "6Server:ntp-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server:ntpdate-0:4.2.6p5-5.el6.i686", "6Server:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.src", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-0:4.2.6p5-5.el6.src", "6Workstation:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation:ntpdate-0:4.2.6p5-5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "ntp: ntpd accepts unauthenticated packets with symmetric key crypto" }, { "acknowledgments": [ { "names": [ "Miroslav Lichv\u00e1r" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2015-1799", "discovery_date": "2015-03-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1199435" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way NTP hosts that were peering with each other authenticated themselves before updating their internal state variables. An attacker could send packets to one peer host, which could cascade to other peers, and stop the synchronization process among the reached peers.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: authentication doesn\u0027t protect symmetric associations against DoS attacks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:ntp-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-0:4.2.6p5-5.el6.src", "6Client-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-0:4.2.6p5-5.el6.i686", "6Client:ntp-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-0:4.2.6p5-5.el6.s390x", "6Client:ntp-0:4.2.6p5-5.el6.src", "6Client:ntp-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client:ntpdate-0:4.2.6p5-5.el6.i686", "6Client:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-0:4.2.6p5-5.el6.src", "6Server-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-0:4.2.6p5-5.el6.i686", "6Server:ntp-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-0:4.2.6p5-5.el6.s390x", "6Server:ntp-0:4.2.6p5-5.el6.src", "6Server:ntp-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server:ntpdate-0:4.2.6p5-5.el6.i686", "6Server:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.src", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-0:4.2.6p5-5.el6.src", "6Workstation:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation:ntpdate-0:4.2.6p5-5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1799" }, { "category": "external", "summary": "RHBZ#1199435", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199435" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1799", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1799" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1799", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1799" } ], "release_date": "2015-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-07-21T10:15:04+00:00", "details": "All ntp users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add these\nenhancements. After installing the update, the ntpd daemon will\nrestart automatically.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-optional:ntp-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-0:4.2.6p5-5.el6.src", "6Client-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-0:4.2.6p5-5.el6.i686", "6Client:ntp-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-0:4.2.6p5-5.el6.s390x", "6Client:ntp-0:4.2.6p5-5.el6.src", "6Client:ntp-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client:ntpdate-0:4.2.6p5-5.el6.i686", "6Client:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-0:4.2.6p5-5.el6.src", "6Server-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-0:4.2.6p5-5.el6.i686", "6Server:ntp-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-0:4.2.6p5-5.el6.s390x", "6Server:ntp-0:4.2.6p5-5.el6.src", "6Server:ntp-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server:ntpdate-0:4.2.6p5-5.el6.i686", "6Server:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.src", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-0:4.2.6p5-5.el6.src", "6Workstation:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation:ntpdate-0:4.2.6p5-5.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1459" }, { "category": "workaround", "details": "To work around this issue, instead of configuring NTP hosts as peers with the \u0027peer\u0027 directive, use the \u0027server\u0027 directive on both hosts so that the connection uses a regular client/server mode of operation.\n\nMore information about how to configure NTP can be found at:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Deployment_Guide/ch-Configuring_NTP_Using_ntpd.html\n\nAutokey authentication between NTP peers is not sufficient to fully mitigate this issue.", "product_ids": [ "6Client-optional:ntp-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-0:4.2.6p5-5.el6.src", "6Client-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-0:4.2.6p5-5.el6.i686", "6Client:ntp-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-0:4.2.6p5-5.el6.s390x", "6Client:ntp-0:4.2.6p5-5.el6.src", "6Client:ntp-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client:ntpdate-0:4.2.6p5-5.el6.i686", "6Client:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-0:4.2.6p5-5.el6.src", "6Server-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-0:4.2.6p5-5.el6.i686", "6Server:ntp-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-0:4.2.6p5-5.el6.s390x", "6Server:ntp-0:4.2.6p5-5.el6.src", "6Server:ntp-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server:ntpdate-0:4.2.6p5-5.el6.i686", "6Server:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.src", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-0:4.2.6p5-5.el6.src", "6Workstation:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation:ntpdate-0:4.2.6p5-5.el6.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-optional:ntp-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-0:4.2.6p5-5.el6.src", "6Client-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-0:4.2.6p5-5.el6.i686", "6Client:ntp-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-0:4.2.6p5-5.el6.s390x", "6Client:ntp-0:4.2.6p5-5.el6.src", "6Client:ntp-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client:ntpdate-0:4.2.6p5-5.el6.i686", "6Client:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-0:4.2.6p5-5.el6.src", "6Server-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-0:4.2.6p5-5.el6.i686", "6Server:ntp-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-0:4.2.6p5-5.el6.s390x", "6Server:ntp-0:4.2.6p5-5.el6.src", "6Server:ntp-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server:ntpdate-0:4.2.6p5-5.el6.i686", "6Server:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.src", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-0:4.2.6p5-5.el6.src", "6Workstation:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation:ntpdate-0:4.2.6p5-5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: authentication doesn\u0027t protect symmetric associations against DoS attacks" }, { "cve": "CVE-2015-3405", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "discovery_date": "2015-04-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1210324" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the ntp-keygen utility generated MD5 symmetric keys on big-endian systems. An attacker could possibly use this flaw to guess generated MD5 keys, which could then be used to spoof an NTP client or server.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: ntp-keygen may generate non-random symmetric keys on big-endian systems", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of ntp as shipped with Red Hat Enterprise Linux 5.\n\nRed Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:ntp-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-0:4.2.6p5-5.el6.src", "6Client-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-0:4.2.6p5-5.el6.i686", "6Client:ntp-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-0:4.2.6p5-5.el6.s390x", "6Client:ntp-0:4.2.6p5-5.el6.src", "6Client:ntp-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client:ntpdate-0:4.2.6p5-5.el6.i686", "6Client:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-0:4.2.6p5-5.el6.src", "6Server-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-0:4.2.6p5-5.el6.i686", "6Server:ntp-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-0:4.2.6p5-5.el6.s390x", "6Server:ntp-0:4.2.6p5-5.el6.src", "6Server:ntp-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server:ntpdate-0:4.2.6p5-5.el6.i686", "6Server:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.src", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-0:4.2.6p5-5.el6.src", "6Workstation:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation:ntpdate-0:4.2.6p5-5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3405" }, { "category": "external", "summary": "RHBZ#1210324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210324" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3405", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3405" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3405", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3405" } ], "release_date": "2015-04-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-07-21T10:15:04+00:00", "details": "All ntp users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add these\nenhancements. After installing the update, the ntpd daemon will\nrestart automatically.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-optional:ntp-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-0:4.2.6p5-5.el6.src", "6Client-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-0:4.2.6p5-5.el6.i686", "6Client:ntp-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-0:4.2.6p5-5.el6.s390x", "6Client:ntp-0:4.2.6p5-5.el6.src", "6Client:ntp-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client:ntpdate-0:4.2.6p5-5.el6.i686", "6Client:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-0:4.2.6p5-5.el6.src", "6Server-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-0:4.2.6p5-5.el6.i686", "6Server:ntp-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-0:4.2.6p5-5.el6.s390x", "6Server:ntp-0:4.2.6p5-5.el6.src", "6Server:ntp-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server:ntpdate-0:4.2.6p5-5.el6.i686", "6Server:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.src", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-0:4.2.6p5-5.el6.src", "6Workstation:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation:ntpdate-0:4.2.6p5-5.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:1459" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Client-optional:ntp-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-0:4.2.6p5-5.el6.src", "6Client-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-0:4.2.6p5-5.el6.i686", "6Client:ntp-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-0:4.2.6p5-5.el6.s390x", "6Client:ntp-0:4.2.6p5-5.el6.src", "6Client:ntp-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Client:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Client:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Client:ntp-perl-0:4.2.6p5-5.el6.i686", "6Client:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Client:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Client:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Client:ntpdate-0:4.2.6p5-5.el6.i686", "6Client:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Client:ntpdate-0:4.2.6p5-5.el6.s390x", "6Client:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-0:4.2.6p5-5.el6.src", "6ComputeNode:ntp-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntp-doc-0:4.2.6p5-5.el6.noarch", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.i686", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.ppc64", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.s390x", "6ComputeNode:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-0:4.2.6p5-5.el6.src", "6Server-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-0:4.2.6p5-5.el6.i686", "6Server:ntp-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-0:4.2.6p5-5.el6.s390x", "6Server:ntp-0:4.2.6p5-5.el6.src", "6Server:ntp-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Server:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Server:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Server:ntp-perl-0:4.2.6p5-5.el6.i686", "6Server:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Server:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Server:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Server:ntpdate-0:4.2.6p5-5.el6.i686", "6Server:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Server:ntpdate-0:4.2.6p5-5.el6.s390x", "6Server:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.src", "6Workstation-optional:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation-optional:ntpdate-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-0:4.2.6p5-5.el6.src", "6Workstation:ntp-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-debuginfo-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntp-doc-0:4.2.6p5-5.el6.noarch", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.i686", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.s390x", "6Workstation:ntp-perl-0:4.2.6p5-5.el6.x86_64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.i686", "6Workstation:ntpdate-0:4.2.6p5-5.el6.ppc64", "6Workstation:ntpdate-0:4.2.6p5-5.el6.s390x", "6Workstation:ntpdate-0:4.2.6p5-5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "ntp: ntp-keygen may generate non-random symmetric keys on big-endian systems" } ] }
rhsa-2015_2231
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated ntp packages that fix multiple security issues, several bugs, and\nadd various enhancements are now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The Network Time Protocol (NTP) is used to synchronize a computer\u0027s time\nwith another referenced time source. These packages include the ntpd\nservice which continuously adjusts system time and utilities used to query\nand configure the ntpd service.\n\nIt was found that because NTP\u0027s access control was based on a source IP\naddress, an attacker could bypass source IP restrictions and send\nmalicious control and configuration packets by spoofing ::1 addresses.\n(CVE-2014-9298, CVE-2014-9751)\n\nA denial of service flaw was found in the way NTP hosts that were peering\nwith each other authenticated themselves before updating their internal\nstate variables. An attacker could send packets to one peer host, which\ncould cascade to other peers, and stop the synchronization process among\nthe reached peers. (CVE-2015-1799)\n\nA flaw was found in the way the ntp-keygen utility generated MD5 symmetric\nkeys on big-endian systems. An attacker could possibly use this flaw to\nguess generated MD5 keys, which could then be used to spoof an NTP client\nor server. (CVE-2015-3405)\n\nA stack-based buffer overflow was found in the way the NTP autokey protocol\nwas implemented. When an NTP client decrypted a secret received from an NTP\nserver, it could cause that client to crash. (CVE-2014-9297, CVE-2014-9750)\n\nIt was found that ntpd did not check whether a Message Authentication Code\n(MAC) was present in a received packet when ntpd was configured to use\nsymmetric cryptographic keys. A man-in-the-middle attacker could use this\nflaw to send crafted packets that would be accepted by a client or a peer\nwithout the attacker knowing the symmetric key. (CVE-2015-1798)\n\nThe CVE-2015-1798 and CVE-2015-1799 issues were discovered by Miroslav\nLichv\u00e1r of Red Hat.\n\nBug fixes:\n\n* The ntpd service truncated symmetric keys specified in the key file to 20\nbytes. As a consequence, it was impossible to configure NTP authentication\nto work with peers that use longer keys. With this update, the maximum key\nlength has been changed to 32 bytes. (BZ#1191111)\n\n* The ntpd service could previously join multicast groups only when\nstarting, which caused problems if ntpd was started during system boot\nbefore network was configured. With this update, ntpd attempts to join\nmulticast groups every time network configuration is changed. (BZ#1207014)\n\n* Previously, the ntp-keygen utility used the exponent of 3 when generating\nRSA keys. Consequently, generating RSA keys failed when FIPS mode was\nenabled. With this update, ntp-keygen has been modified to use the exponent\nof 65537, and generating keys in FIPS mode now works as expected.\n(BZ#1191116)\n\n* The ntpd service dropped incoming NTP packets if their source port was\nlower than 123 (the NTP port). With this update, ntpd no longer checks the\nsource port number, and clients behind NAT are now able to correctly\nsynchronize with the server. (BZ#1171640)\n\nEnhancements:\n\n* This update adds support for configurable Differentiated Services Code\nPoints (DSCP) in NTP packets, simplifying configuration in large networks\nwhere different NTP implementations or versions are using different DSCP\nvalues. (BZ#1202828)\n\n* This update adds the ability to configure separate clock stepping\nthresholds for each direction (backward and forward). Use the \"stepback\"\nand \"stepfwd\" options to configure each threshold. (BZ#1193154)\n\n* Support for nanosecond resolution has been added to the Structural\nHealth Monitoring (SHM) reference clock. Prior to this update, when a\nPrecision Time Protocol (PTP) hardware clock was used as a time source to\nsynchronize the system clock, the accuracy of the synchronization was\nlimited due to the microsecond resolution of the SHM protocol. The\nnanosecond extension in the SHM protocol now allows sub-microsecond\nsynchronization of the system clock. (BZ#1117702)\n\nAll ntp users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add these\nenhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2231", "url": "https://access.redhat.com/errata/RHSA-2015:2231" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1117702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1117702" }, { "category": "external", "summary": "1122012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1122012" }, { "category": "external", "summary": "1171640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1171640" }, { "category": "external", "summary": "1180721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1180721" }, { "category": "external", "summary": "1184572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184572" }, { "category": "external", "summary": "1184573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184573" }, { "category": "external", "summary": "1191108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191108" }, { "category": "external", "summary": "1191122", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1191122" }, { "category": "external", "summary": "1193154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1193154" }, { "category": "external", "summary": "1199430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199430" }, { "category": "external", "summary": "1199435", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199435" }, { "category": "external", "summary": "1210324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210324" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2231.json" } ], "title": "Red Hat Security Advisory: ntp security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-05T19:05:53+00:00", "generator": { "date": "2024-11-05T19:05:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2015:2231", "initial_release_date": "2015-11-19T04:03:04+00:00", "revision_history": [ { "date": "2015-11-19T04:03:04+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-11-19T04:03:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T19:05:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "ntp-perl-0:4.2.6p5-22.el7.noarch", "product": { "name": "ntp-perl-0:4.2.6p5-22.el7.noarch", "product_id": "ntp-perl-0:4.2.6p5-22.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-perl@4.2.6p5-22.el7?arch=noarch" } } }, { "category": "product_version", "name": "ntp-doc-0:4.2.6p5-22.el7.noarch", "product": { "name": "ntp-doc-0:4.2.6p5-22.el7.noarch", "product_id": "ntp-doc-0:4.2.6p5-22.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-doc@4.2.6p5-22.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7?arch=x86_64" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7.x86_64", "product": { "name": "sntp-0:4.2.6p5-22.el7.x86_64", "product_id": "sntp-0:4.2.6p5-22.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7?arch=x86_64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7.x86_64", "product": { "name": "ntpdate-0:4.2.6p5-22.el7.x86_64", "product_id": "ntpdate-0:4.2.6p5-22.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7?arch=x86_64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7.x86_64", "product": { "name": "ntp-0:4.2.6p5-22.el7.x86_64", "product_id": "ntp-0:4.2.6p5-22.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7.src", "product": { "name": "ntp-0:4.2.6p5-22.el7.src", "product_id": "ntp-0:4.2.6p5-22.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7?arch=ppc64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7.ppc64", "product": { "name": "ntpdate-0:4.2.6p5-22.el7.ppc64", "product_id": "ntpdate-0:4.2.6p5-22.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7?arch=ppc64" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7.ppc64", "product": { "name": "ntp-0:4.2.6p5-22.el7.ppc64", "product_id": "ntp-0:4.2.6p5-22.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7?arch=ppc64" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7.ppc64", "product": { "name": "sntp-0:4.2.6p5-22.el7.ppc64", "product_id": "sntp-0:4.2.6p5-22.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7.aarch64", "product": { "name": "ntp-0:4.2.6p5-22.el7.aarch64", "product_id": "ntp-0:4.2.6p5-22.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7?arch=aarch64" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7?arch=aarch64" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7.aarch64", "product": { "name": "ntpdate-0:4.2.6p5-22.el7.aarch64", "product_id": "ntpdate-0:4.2.6p5-22.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7?arch=aarch64" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7.aarch64", "product": { "name": "sntp-0:4.2.6p5-22.el7.aarch64", "product_id": "sntp-0:4.2.6p5-22.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7.s390x", "product": { "name": "ntp-0:4.2.6p5-22.el7.s390x", "product_id": "ntp-0:4.2.6p5-22.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7?arch=s390x" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7?arch=s390x" } } }, { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7.s390x", "product": { "name": "ntpdate-0:4.2.6p5-22.el7.s390x", "product_id": "ntpdate-0:4.2.6p5-22.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7?arch=s390x" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7.s390x", "product": { "name": "sntp-0:4.2.6p5-22.el7.s390x", "product_id": "sntp-0:4.2.6p5-22.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ntpdate-0:4.2.6p5-22.el7.ppc64le", "product": { "name": "ntpdate-0:4.2.6p5-22.el7.ppc64le", "product_id": "ntpdate-0:4.2.6p5-22.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntpdate@4.2.6p5-22.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "ntp-0:4.2.6p5-22.el7.ppc64le", "product": { "name": "ntp-0:4.2.6p5-22.el7.ppc64le", "product_id": "ntp-0:4.2.6p5-22.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp@4.2.6p5-22.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "product": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "product_id": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/ntp-debuginfo@4.2.6p5-22.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "sntp-0:4.2.6p5-22.el7.ppc64le", "product": { "name": "sntp-0:4.2.6p5-22.el7.ppc64le", "product_id": "sntp-0:4.2.6p5-22.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/sntp@4.2.6p5-22.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ntp-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "ntp-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ntp-0:4.2.6p5-22.el7.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ntp-0:4.2.6p5-22.el7.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7.src", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ntp-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ntp-doc-0:4.2.6p5-22.el7.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7.noarch", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ntp-perl-0:4.2.6p5-22.el7.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7.noarch", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ntpdate-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ntpdate-0:4.2.6p5-22.el7.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:ntpdate-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:sntp-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "sntp-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:sntp-0:4.2.6p5-22.el7.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional:sntp-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ntp-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "ntp-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ntp-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ntp-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ntp-0:4.2.6p5-22.el7.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ntp-0:4.2.6p5-22.el7.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7.src", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ntp-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ntp-doc-0:4.2.6p5-22.el7.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7.noarch", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ntp-perl-0:4.2.6p5-22.el7.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7.noarch", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ntpdate-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ntpdate-0:4.2.6p5-22.el7.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:ntpdate-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:sntp-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "sntp-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:sntp-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:sntp-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:sntp-0:4.2.6p5-22.el7.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client:sntp-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7Client" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "ntp-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7.src", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ntp-doc-0:4.2.6p5-22.el7.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ntp-perl-0:4.2.6p5-22.el7.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "sntp-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ntp-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "ntp-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ntp-0:4.2.6p5-22.el7.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ntp-0:4.2.6p5-22.el7.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7.src", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ntp-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ntp-doc-0:4.2.6p5-22.el7.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7.noarch", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ntp-perl-0:4.2.6p5-22.el7.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7.noarch", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:sntp-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "sntp-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:sntp-0:4.2.6p5-22.el7.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode:sntp-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ntp-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "ntp-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ntp-0:4.2.6p5-22.el7.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ntp-0:4.2.6p5-22.el7.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7.src", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ntp-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ntp-doc-0:4.2.6p5-22.el7.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7.noarch", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ntp-perl-0:4.2.6p5-22.el7.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7.noarch", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ntpdate-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ntpdate-0:4.2.6p5-22.el7.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:ntpdate-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:sntp-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "sntp-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:sntp-0:4.2.6p5-22.el7.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional:sntp-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ntp-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "ntp-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ntp-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ntp-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ntp-0:4.2.6p5-22.el7.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ntp-0:4.2.6p5-22.el7.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7.src", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ntp-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ntp-doc-0:4.2.6p5-22.el7.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7.noarch", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ntp-perl-0:4.2.6p5-22.el7.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7.noarch", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ntpdate-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ntpdate-0:4.2.6p5-22.el7.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:ntpdate-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:sntp-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "sntp-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:sntp-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:sntp-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:sntp-0:4.2.6p5-22.el7.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server:sntp-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7Server" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional:ntp-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "ntp-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional:ntp-0:4.2.6p5-22.el7.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional:ntp-0:4.2.6p5-22.el7.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7.src", "relates_to_product_reference": "7Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional:ntp-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional:ntp-doc-0:4.2.6p5-22.el7.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7.noarch", "relates_to_product_reference": "7Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional:ntp-perl-0:4.2.6p5-22.el7.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7.noarch", "relates_to_product_reference": "7Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional:sntp-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "sntp-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional:sntp-0:4.2.6p5-22.el7.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional:sntp-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ntp-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "ntp-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "ntp-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "ntp-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ntp-0:4.2.6p5-22.el7.s390x" }, "product_reference": "ntp-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ntp-0:4.2.6p5-22.el7.src" }, "product_reference": "ntp-0:4.2.6p5-22.el7.src", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ntp-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "ntp-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.s390x" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-debuginfo-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-doc-0:4.2.6p5-22.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ntp-doc-0:4.2.6p5-22.el7.noarch" }, "product_reference": "ntp-doc-0:4.2.6p5-22.el7.noarch", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntp-perl-0:4.2.6p5-22.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ntp-perl-0:4.2.6p5-22.el7.noarch" }, "product_reference": "ntp-perl-0:4.2.6p5-22.el7.noarch", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ntpdate-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ntpdate-0:4.2.6p5-22.el7.s390x" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "ntpdate-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:ntpdate-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "ntpdate-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.aarch64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:sntp-0:4.2.6p5-22.el7.aarch64" }, "product_reference": "sntp-0:4.2.6p5-22.el7.aarch64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64" }, "product_reference": "sntp-0:4.2.6p5-22.el7.ppc64", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64le" }, "product_reference": "sntp-0:4.2.6p5-22.el7.ppc64le", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:sntp-0:4.2.6p5-22.el7.s390x" }, "product_reference": "sntp-0:4.2.6p5-22.el7.s390x", "relates_to_product_reference": "7Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "sntp-0:4.2.6p5-22.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation:sntp-0:4.2.6p5-22.el7.x86_64" }, "product_reference": "sntp-0:4.2.6p5-22.el7.x86_64", "relates_to_product_reference": "7Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9297", "discovery_date": "2015-01-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1184573" } ], "notes": [ { "category": "description", "text": "A stack-based buffer overflow was found in the way the NTP autokey protocol was implemented. When an NTP client decrypted a secret received from an NTP server, it could cause that client to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: vallen in extension fields are not validated", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of ntp as shipped with Red Hat Enterprise Linux 5.\n\nRed Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nA mitigation for Red Hat Enterprise Linux 6 and 7 is available at: https://bugzilla.redhat.com/show_bug.cgi?id=1184573#c16", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-0:4.2.6p5-22.el7.src", "7Client-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-0:4.2.6p5-22.el7.s390x", "7Client:ntp-0:4.2.6p5-22.el7.src", "7Client:ntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client:sntp-0:4.2.6p5-22.el7.aarch64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client:sntp-0:4.2.6p5-22.el7.s390x", "7Client:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:sntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-0:4.2.6p5-22.el7.src", "7Server-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-0:4.2.6p5-22.el7.s390x", "7Server:ntp-0:4.2.6p5-22.el7.src", "7Server:ntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server:sntp-0:4.2.6p5-22.el7.aarch64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server:sntp-0:4.2.6p5-22.el7.s390x", "7Server:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.src", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-0:4.2.6p5-22.el7.src", "7Workstation:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation:sntp-0:4.2.6p5-22.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-9297" }, { "category": "external", "summary": "RHBZ#1184573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184573" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-9297", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9297" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-9297", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9297" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#vallen_is_not_validated_in_sever", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#vallen_is_not_validated_in_sever" } ], "release_date": "2015-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-11-19T04:03:04+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-0:4.2.6p5-22.el7.src", "7Client-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-0:4.2.6p5-22.el7.s390x", "7Client:ntp-0:4.2.6p5-22.el7.src", "7Client:ntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client:sntp-0:4.2.6p5-22.el7.aarch64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client:sntp-0:4.2.6p5-22.el7.s390x", "7Client:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:sntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-0:4.2.6p5-22.el7.src", "7Server-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-0:4.2.6p5-22.el7.s390x", "7Server:ntp-0:4.2.6p5-22.el7.src", "7Server:ntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server:sntp-0:4.2.6p5-22.el7.aarch64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server:sntp-0:4.2.6p5-22.el7.s390x", "7Server:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.src", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-0:4.2.6p5-22.el7.src", "7Workstation:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation:sntp-0:4.2.6p5-22.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2231" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "7Client-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-0:4.2.6p5-22.el7.src", "7Client-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-0:4.2.6p5-22.el7.s390x", "7Client:ntp-0:4.2.6p5-22.el7.src", "7Client:ntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client:sntp-0:4.2.6p5-22.el7.aarch64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client:sntp-0:4.2.6p5-22.el7.s390x", "7Client:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:sntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-0:4.2.6p5-22.el7.src", "7Server-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-0:4.2.6p5-22.el7.s390x", "7Server:ntp-0:4.2.6p5-22.el7.src", "7Server:ntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server:sntp-0:4.2.6p5-22.el7.aarch64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server:sntp-0:4.2.6p5-22.el7.s390x", "7Server:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.src", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-0:4.2.6p5-22.el7.src", "7Workstation:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation:sntp-0:4.2.6p5-22.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "ntp: vallen in extension fields are not validated" }, { "cve": "CVE-2014-9298", "discovery_date": "2015-01-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1184572" } ], "notes": [ { "category": "description", "text": "It was found that because NTP\u0027s access control was based on a source IP address, an attacker could bypass source IP restrictions and send malicious control and configuration packets by spoofing ::1 addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: drop packets with source address ::1", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of ntp as shipped with Red Hat Enterprise Linux 5.\n\nRed Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nTo mitigate this issue, you may use the ip6tables command to prevent spoofing of local addresses on any network interface other than the loopback interface. Refer to the Mitigation section on our KBase article: https://access.redhat.com/articles/1305723", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-0:4.2.6p5-22.el7.src", "7Client-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-0:4.2.6p5-22.el7.s390x", "7Client:ntp-0:4.2.6p5-22.el7.src", "7Client:ntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client:sntp-0:4.2.6p5-22.el7.aarch64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client:sntp-0:4.2.6p5-22.el7.s390x", "7Client:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:sntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-0:4.2.6p5-22.el7.src", "7Server-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-0:4.2.6p5-22.el7.s390x", "7Server:ntp-0:4.2.6p5-22.el7.src", "7Server:ntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server:sntp-0:4.2.6p5-22.el7.aarch64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server:sntp-0:4.2.6p5-22.el7.s390x", "7Server:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.src", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-0:4.2.6p5-22.el7.src", "7Workstation:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation:sntp-0:4.2.6p5-22.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-9298" }, { "category": "external", "summary": "RHBZ#1184572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184572" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-9298", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9298" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-9298", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9298" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#1_can_be_spoofed_on_some_OSes_so", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#1_can_be_spoofed_on_some_OSes_so" } ], "release_date": "2015-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-11-19T04:03:04+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-0:4.2.6p5-22.el7.src", "7Client-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-0:4.2.6p5-22.el7.s390x", "7Client:ntp-0:4.2.6p5-22.el7.src", "7Client:ntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client:sntp-0:4.2.6p5-22.el7.aarch64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client:sntp-0:4.2.6p5-22.el7.s390x", "7Client:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:sntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-0:4.2.6p5-22.el7.src", "7Server-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-0:4.2.6p5-22.el7.s390x", "7Server:ntp-0:4.2.6p5-22.el7.src", "7Server:ntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server:sntp-0:4.2.6p5-22.el7.aarch64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server:sntp-0:4.2.6p5-22.el7.s390x", "7Server:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.src", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-0:4.2.6p5-22.el7.src", "7Workstation:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation:sntp-0:4.2.6p5-22.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2231" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "7Client-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-0:4.2.6p5-22.el7.src", "7Client-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-0:4.2.6p5-22.el7.s390x", "7Client:ntp-0:4.2.6p5-22.el7.src", "7Client:ntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client:sntp-0:4.2.6p5-22.el7.aarch64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client:sntp-0:4.2.6p5-22.el7.s390x", "7Client:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:sntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-0:4.2.6p5-22.el7.src", "7Server-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-0:4.2.6p5-22.el7.s390x", "7Server:ntp-0:4.2.6p5-22.el7.src", "7Server:ntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server:sntp-0:4.2.6p5-22.el7.aarch64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server:sntp-0:4.2.6p5-22.el7.s390x", "7Server:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.src", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-0:4.2.6p5-22.el7.src", "7Workstation:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation:sntp-0:4.2.6p5-22.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: drop packets with source address ::1" }, { "cve": "CVE-2014-9750", "discovery_date": "2015-01-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1184573" } ], "notes": [ { "category": "description", "text": "A stack-based buffer overflow was found in the way the NTP autokey protocol was implemented. When an NTP client decrypted a secret received from an NTP server, it could cause that client to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: vallen in extension fields are not validated", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of ntp as shipped with Red Hat Enterprise Linux 5.\n\nRed Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nA mitigation for Red Hat Enterprise Linux 6 and 7 is available at: https://bugzilla.redhat.com/show_bug.cgi?id=1184573#c16", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-0:4.2.6p5-22.el7.src", "7Client-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-0:4.2.6p5-22.el7.s390x", "7Client:ntp-0:4.2.6p5-22.el7.src", "7Client:ntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client:sntp-0:4.2.6p5-22.el7.aarch64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client:sntp-0:4.2.6p5-22.el7.s390x", "7Client:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:sntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-0:4.2.6p5-22.el7.src", "7Server-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-0:4.2.6p5-22.el7.s390x", "7Server:ntp-0:4.2.6p5-22.el7.src", "7Server:ntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server:sntp-0:4.2.6p5-22.el7.aarch64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server:sntp-0:4.2.6p5-22.el7.s390x", "7Server:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.src", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-0:4.2.6p5-22.el7.src", "7Workstation:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation:sntp-0:4.2.6p5-22.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-9750" }, { "category": "external", "summary": "RHBZ#1184573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184573" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-9750", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-9750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9750" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#vallen_is_not_validated_in_sever", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#vallen_is_not_validated_in_sever" } ], "release_date": "2015-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-11-19T04:03:04+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-0:4.2.6p5-22.el7.src", "7Client-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-0:4.2.6p5-22.el7.s390x", "7Client:ntp-0:4.2.6p5-22.el7.src", "7Client:ntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client:sntp-0:4.2.6p5-22.el7.aarch64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client:sntp-0:4.2.6p5-22.el7.s390x", "7Client:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:sntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-0:4.2.6p5-22.el7.src", "7Server-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-0:4.2.6p5-22.el7.s390x", "7Server:ntp-0:4.2.6p5-22.el7.src", "7Server:ntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server:sntp-0:4.2.6p5-22.el7.aarch64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server:sntp-0:4.2.6p5-22.el7.s390x", "7Server:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.src", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-0:4.2.6p5-22.el7.src", "7Workstation:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation:sntp-0:4.2.6p5-22.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2231" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "7Client-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-0:4.2.6p5-22.el7.src", "7Client-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-0:4.2.6p5-22.el7.s390x", "7Client:ntp-0:4.2.6p5-22.el7.src", "7Client:ntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client:sntp-0:4.2.6p5-22.el7.aarch64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client:sntp-0:4.2.6p5-22.el7.s390x", "7Client:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:sntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-0:4.2.6p5-22.el7.src", "7Server-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-0:4.2.6p5-22.el7.s390x", "7Server:ntp-0:4.2.6p5-22.el7.src", "7Server:ntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server:sntp-0:4.2.6p5-22.el7.aarch64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server:sntp-0:4.2.6p5-22.el7.s390x", "7Server:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.src", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-0:4.2.6p5-22.el7.src", "7Workstation:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation:sntp-0:4.2.6p5-22.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "ntp: vallen in extension fields are not validated" }, { "cve": "CVE-2014-9751", "discovery_date": "2015-01-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1184572" } ], "notes": [ { "category": "description", "text": "It was found that because NTP\u0027s access control was based on a source IP address, an attacker could bypass source IP restrictions and send malicious control and configuration packets by spoofing ::1 addresses.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: drop packets with source address ::1", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of ntp as shipped with Red Hat Enterprise Linux 5.\n\nRed Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nTo mitigate this issue, you may use the ip6tables command to prevent spoofing of local addresses on any network interface other than the loopback interface. Refer to the Mitigation section on our KBase article: https://access.redhat.com/articles/1305723", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-0:4.2.6p5-22.el7.src", "7Client-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-0:4.2.6p5-22.el7.s390x", "7Client:ntp-0:4.2.6p5-22.el7.src", "7Client:ntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client:sntp-0:4.2.6p5-22.el7.aarch64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client:sntp-0:4.2.6p5-22.el7.s390x", "7Client:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:sntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-0:4.2.6p5-22.el7.src", "7Server-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-0:4.2.6p5-22.el7.s390x", "7Server:ntp-0:4.2.6p5-22.el7.src", "7Server:ntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server:sntp-0:4.2.6p5-22.el7.aarch64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server:sntp-0:4.2.6p5-22.el7.s390x", "7Server:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.src", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-0:4.2.6p5-22.el7.src", "7Workstation:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation:sntp-0:4.2.6p5-22.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-9751" }, { "category": "external", "summary": "RHBZ#1184572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184572" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-9751", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9751" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-9751", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9751" }, { "category": "external", "summary": "http://support.ntp.org/bin/view/Main/SecurityNotice#1_can_be_spoofed_on_some_OSes_so", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#1_can_be_spoofed_on_some_OSes_so" } ], "release_date": "2015-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-11-19T04:03:04+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-0:4.2.6p5-22.el7.src", "7Client-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-0:4.2.6p5-22.el7.s390x", "7Client:ntp-0:4.2.6p5-22.el7.src", "7Client:ntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client:sntp-0:4.2.6p5-22.el7.aarch64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client:sntp-0:4.2.6p5-22.el7.s390x", "7Client:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:sntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-0:4.2.6p5-22.el7.src", "7Server-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-0:4.2.6p5-22.el7.s390x", "7Server:ntp-0:4.2.6p5-22.el7.src", "7Server:ntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server:sntp-0:4.2.6p5-22.el7.aarch64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server:sntp-0:4.2.6p5-22.el7.s390x", "7Server:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.src", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-0:4.2.6p5-22.el7.src", "7Workstation:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation:sntp-0:4.2.6p5-22.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2231" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "7Client-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-0:4.2.6p5-22.el7.src", "7Client-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-0:4.2.6p5-22.el7.s390x", "7Client:ntp-0:4.2.6p5-22.el7.src", "7Client:ntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client:sntp-0:4.2.6p5-22.el7.aarch64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client:sntp-0:4.2.6p5-22.el7.s390x", "7Client:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:sntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-0:4.2.6p5-22.el7.src", "7Server-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-0:4.2.6p5-22.el7.s390x", "7Server:ntp-0:4.2.6p5-22.el7.src", "7Server:ntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server:sntp-0:4.2.6p5-22.el7.aarch64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server:sntp-0:4.2.6p5-22.el7.s390x", "7Server:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.src", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-0:4.2.6p5-22.el7.src", "7Workstation:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation:sntp-0:4.2.6p5-22.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: drop packets with source address ::1" }, { "acknowledgments": [ { "names": [ "Miroslav Lichv\u00e1r" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2015-1798", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "discovery_date": "2015-03-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1199430" } ], "notes": [ { "category": "description", "text": "It was found that ntpd did not check whether a Message Authentication Code (MAC) was present in a received packet when ntpd was configured to use symmetric cryptographic keys. A man-in-the-middle attacker could use this flaw to send crafted packets that would be accepted by a client or a peer without the attacker knowing the symmetric key.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: ntpd accepts unauthenticated packets with symmetric key crypto", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of ntp as shipped with Red Hat Enterprise Linux 5", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-0:4.2.6p5-22.el7.src", "7Client-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-0:4.2.6p5-22.el7.s390x", "7Client:ntp-0:4.2.6p5-22.el7.src", "7Client:ntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client:sntp-0:4.2.6p5-22.el7.aarch64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client:sntp-0:4.2.6p5-22.el7.s390x", "7Client:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:sntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-0:4.2.6p5-22.el7.src", "7Server-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-0:4.2.6p5-22.el7.s390x", "7Server:ntp-0:4.2.6p5-22.el7.src", "7Server:ntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server:sntp-0:4.2.6p5-22.el7.aarch64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server:sntp-0:4.2.6p5-22.el7.s390x", "7Server:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.src", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-0:4.2.6p5-22.el7.src", "7Workstation:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation:sntp-0:4.2.6p5-22.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1798" }, { "category": "external", "summary": "RHBZ#1199430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199430" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1798", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1798" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1798", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1798" } ], "release_date": "2015-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-11-19T04:03:04+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-0:4.2.6p5-22.el7.src", "7Client-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-0:4.2.6p5-22.el7.s390x", "7Client:ntp-0:4.2.6p5-22.el7.src", "7Client:ntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client:sntp-0:4.2.6p5-22.el7.aarch64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client:sntp-0:4.2.6p5-22.el7.s390x", "7Client:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:sntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-0:4.2.6p5-22.el7.src", "7Server-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-0:4.2.6p5-22.el7.s390x", "7Server:ntp-0:4.2.6p5-22.el7.src", "7Server:ntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server:sntp-0:4.2.6p5-22.el7.aarch64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server:sntp-0:4.2.6p5-22.el7.s390x", "7Server:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.src", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-0:4.2.6p5-22.el7.src", "7Workstation:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation:sntp-0:4.2.6p5-22.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2231" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "7Client-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-0:4.2.6p5-22.el7.src", "7Client-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-0:4.2.6p5-22.el7.s390x", "7Client:ntp-0:4.2.6p5-22.el7.src", "7Client:ntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client:sntp-0:4.2.6p5-22.el7.aarch64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client:sntp-0:4.2.6p5-22.el7.s390x", "7Client:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:sntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-0:4.2.6p5-22.el7.src", "7Server-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-0:4.2.6p5-22.el7.s390x", "7Server:ntp-0:4.2.6p5-22.el7.src", "7Server:ntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server:sntp-0:4.2.6p5-22.el7.aarch64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server:sntp-0:4.2.6p5-22.el7.s390x", "7Server:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.src", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-0:4.2.6p5-22.el7.src", "7Workstation:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation:sntp-0:4.2.6p5-22.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "ntp: ntpd accepts unauthenticated packets with symmetric key crypto" }, { "acknowledgments": [ { "names": [ "Miroslav Lichv\u00e1r" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2015-1799", "discovery_date": "2015-03-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1199435" } ], "notes": [ { "category": "description", "text": "A denial of service flaw was found in the way NTP hosts that were peering with each other authenticated themselves before updating their internal state variables. An attacker could send packets to one peer host, which could cascade to other peers, and stop the synchronization process among the reached peers.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: authentication doesn\u0027t protect symmetric associations against DoS attacks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-0:4.2.6p5-22.el7.src", "7Client-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-0:4.2.6p5-22.el7.s390x", "7Client:ntp-0:4.2.6p5-22.el7.src", "7Client:ntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client:sntp-0:4.2.6p5-22.el7.aarch64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client:sntp-0:4.2.6p5-22.el7.s390x", "7Client:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:sntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-0:4.2.6p5-22.el7.src", "7Server-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-0:4.2.6p5-22.el7.s390x", "7Server:ntp-0:4.2.6p5-22.el7.src", "7Server:ntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server:sntp-0:4.2.6p5-22.el7.aarch64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server:sntp-0:4.2.6p5-22.el7.s390x", "7Server:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.src", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-0:4.2.6p5-22.el7.src", "7Workstation:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation:sntp-0:4.2.6p5-22.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1799" }, { "category": "external", "summary": "RHBZ#1199435", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1199435" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1799", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1799" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1799", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1799" } ], "release_date": "2015-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-11-19T04:03:04+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-0:4.2.6p5-22.el7.src", "7Client-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-0:4.2.6p5-22.el7.s390x", "7Client:ntp-0:4.2.6p5-22.el7.src", "7Client:ntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client:sntp-0:4.2.6p5-22.el7.aarch64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client:sntp-0:4.2.6p5-22.el7.s390x", "7Client:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:sntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-0:4.2.6p5-22.el7.src", "7Server-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-0:4.2.6p5-22.el7.s390x", "7Server:ntp-0:4.2.6p5-22.el7.src", "7Server:ntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server:sntp-0:4.2.6p5-22.el7.aarch64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server:sntp-0:4.2.6p5-22.el7.s390x", "7Server:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.src", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-0:4.2.6p5-22.el7.src", "7Workstation:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation:sntp-0:4.2.6p5-22.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2231" }, { "category": "workaround", "details": "To work around this issue, instead of configuring NTP hosts as peers with the \u0027peer\u0027 directive, use the \u0027server\u0027 directive on both hosts so that the connection uses a regular client/server mode of operation.\n\nMore information about how to configure NTP can be found at:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Deployment_Guide/ch-Configuring_NTP_Using_ntpd.html\n\nAutokey authentication between NTP peers is not sufficient to fully mitigate this issue.", "product_ids": [ "7Client-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-0:4.2.6p5-22.el7.src", "7Client-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-0:4.2.6p5-22.el7.s390x", "7Client:ntp-0:4.2.6p5-22.el7.src", "7Client:ntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client:sntp-0:4.2.6p5-22.el7.aarch64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client:sntp-0:4.2.6p5-22.el7.s390x", "7Client:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:sntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-0:4.2.6p5-22.el7.src", "7Server-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-0:4.2.6p5-22.el7.s390x", "7Server:ntp-0:4.2.6p5-22.el7.src", "7Server:ntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server:sntp-0:4.2.6p5-22.el7.aarch64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server:sntp-0:4.2.6p5-22.el7.s390x", "7Server:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.src", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-0:4.2.6p5-22.el7.src", "7Workstation:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation:sntp-0:4.2.6p5-22.el7.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "7Client-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-0:4.2.6p5-22.el7.src", "7Client-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-0:4.2.6p5-22.el7.s390x", "7Client:ntp-0:4.2.6p5-22.el7.src", "7Client:ntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client:sntp-0:4.2.6p5-22.el7.aarch64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client:sntp-0:4.2.6p5-22.el7.s390x", "7Client:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:sntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-0:4.2.6p5-22.el7.src", "7Server-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-0:4.2.6p5-22.el7.s390x", "7Server:ntp-0:4.2.6p5-22.el7.src", "7Server:ntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server:sntp-0:4.2.6p5-22.el7.aarch64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server:sntp-0:4.2.6p5-22.el7.s390x", "7Server:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.src", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-0:4.2.6p5-22.el7.src", "7Workstation:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation:sntp-0:4.2.6p5-22.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ntp: authentication doesn\u0027t protect symmetric associations against DoS attacks" }, { "cve": "CVE-2015-3405", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "discovery_date": "2015-04-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1210324" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the ntp-keygen utility generated MD5 symmetric keys on big-endian systems. An attacker could possibly use this flaw to guess generated MD5 keys, which could then be used to spoof an NTP client or server.", "title": "Vulnerability description" }, { "category": "summary", "text": "ntp: ntp-keygen may generate non-random symmetric keys on big-endian systems", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of ntp as shipped with Red Hat Enterprise Linux 5.\n\nRed Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-0:4.2.6p5-22.el7.src", "7Client-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-0:4.2.6p5-22.el7.s390x", "7Client:ntp-0:4.2.6p5-22.el7.src", "7Client:ntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client:sntp-0:4.2.6p5-22.el7.aarch64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client:sntp-0:4.2.6p5-22.el7.s390x", "7Client:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:sntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-0:4.2.6p5-22.el7.src", "7Server-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-0:4.2.6p5-22.el7.s390x", "7Server:ntp-0:4.2.6p5-22.el7.src", "7Server:ntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server:sntp-0:4.2.6p5-22.el7.aarch64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server:sntp-0:4.2.6p5-22.el7.s390x", "7Server:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.src", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-0:4.2.6p5-22.el7.src", "7Workstation:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation:sntp-0:4.2.6p5-22.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3405" }, { "category": "external", "summary": "RHBZ#1210324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210324" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3405", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3405" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3405", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3405" } ], "release_date": "2015-04-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-11-19T04:03:04+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-0:4.2.6p5-22.el7.src", "7Client-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-0:4.2.6p5-22.el7.s390x", "7Client:ntp-0:4.2.6p5-22.el7.src", "7Client:ntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client:sntp-0:4.2.6p5-22.el7.aarch64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client:sntp-0:4.2.6p5-22.el7.s390x", "7Client:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:sntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-0:4.2.6p5-22.el7.src", "7Server-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-0:4.2.6p5-22.el7.s390x", "7Server:ntp-0:4.2.6p5-22.el7.src", "7Server:ntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server:sntp-0:4.2.6p5-22.el7.aarch64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server:sntp-0:4.2.6p5-22.el7.s390x", "7Server:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.src", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-0:4.2.6p5-22.el7.src", "7Workstation:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation:sntp-0:4.2.6p5-22.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2231" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "7Client-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-0:4.2.6p5-22.el7.src", "7Client-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Client-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Client-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-0:4.2.6p5-22.el7.s390x", "7Client:ntp-0:4.2.6p5-22.el7.src", "7Client:ntp-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Client:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Client:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Client:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Client:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Client:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Client:ntpdate-0:4.2.6p5-22.el7.s390x", "7Client:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Client:sntp-0:4.2.6p5-22.el7.aarch64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64", "7Client:sntp-0:4.2.6p5-22.el7.ppc64le", "7Client:sntp-0:4.2.6p5-22.el7.s390x", "7Client:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-0:4.2.6p5-22.el7.src", "7ComputeNode:ntp-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:ntp-doc-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntp-perl-0:4.2.6p5-22.el7.noarch", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.s390x", "7ComputeNode:ntpdate-0:4.2.6p5-22.el7.x86_64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.aarch64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64", "7ComputeNode:sntp-0:4.2.6p5-22.el7.ppc64le", "7ComputeNode:sntp-0:4.2.6p5-22.el7.s390x", "7ComputeNode:sntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-0:4.2.6p5-22.el7.src", "7Server-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Server-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Server-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-0:4.2.6p5-22.el7.s390x", "7Server:ntp-0:4.2.6p5-22.el7.src", "7Server:ntp-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Server:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Server:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Server:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Server:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Server:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Server:ntpdate-0:4.2.6p5-22.el7.s390x", "7Server:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Server:sntp-0:4.2.6p5-22.el7.aarch64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64", "7Server:sntp-0:4.2.6p5-22.el7.ppc64le", "7Server:sntp-0:4.2.6p5-22.el7.s390x", "7Server:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.src", "7Workstation-optional:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation-optional:sntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-0:4.2.6p5-22.el7.src", "7Workstation:ntp-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.s390x", "7Workstation:ntp-debuginfo-0:4.2.6p5-22.el7.x86_64", "7Workstation:ntp-doc-0:4.2.6p5-22.el7.noarch", "7Workstation:ntp-perl-0:4.2.6p5-22.el7.noarch", "7Workstation:ntpdate-0:4.2.6p5-22.el7.aarch64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64", "7Workstation:ntpdate-0:4.2.6p5-22.el7.ppc64le", "7Workstation:ntpdate-0:4.2.6p5-22.el7.s390x", "7Workstation:ntpdate-0:4.2.6p5-22.el7.x86_64", "7Workstation:sntp-0:4.2.6p5-22.el7.aarch64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64", "7Workstation:sntp-0:4.2.6p5-22.el7.ppc64le", "7Workstation:sntp-0:4.2.6p5-22.el7.s390x", "7Workstation:sntp-0:4.2.6p5-22.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "ntp: ntp-keygen may generate non-random symmetric keys on big-endian systems" } ] }
var-201504-0362
Vulnerability from variot
The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer. NTP Project ntpd reference implementation accepts unauthenticated packets with symmetric key cryptography and does not protect symmetric associations against denial of service attacks. NTP of ntpd of ntp_proto.c Inside receive of symmetric-key The function is used even when a specific invalid packet is received. state variable Service operation disruption to perform update ( Sync failure ) There are vulnerabilities that are put into a state. Supplementary information : CWE Vulnerability type by CWE-17: Code ( code ) Has been identified. http://cwe.mitre.org/data/definitions/17.htmlMan-in-the-middle attacks (man-in-the-middle attack) By the source of the peer IP Denial of service by spoofing addresses ( Sync failure ) There is a possibility of being put into a state. NTP is prone to a denial-of-service vulnerability. Successful exploits may allow the attacker to cause a denial-of-service condition.
Here are the details from the Slackware 14.1 ChangeLog: +--------------------------+ patches/packages/ntp-4.2.8p2-i486-1_slack14.1.txz: Upgraded. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1798 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1799 ( Security fix ) +--------------------------+
Where to find the new packages: +-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.
Updated package for Slackware 13.0: ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/ntp-4.2.8p2-i486-1_slack13.0.txz
Updated package for Slackware x86_64 13.0: ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/ntp-4.2.8p2-x86_64-1_slack13.0.txz
Updated package for Slackware 13.1: ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/ntp-4.2.8p2-i486-1_slack13.1.txz
Updated package for Slackware x86_64 13.1: ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/ntp-4.2.8p2-x86_64-1_slack13.1.txz
Updated package for Slackware 13.37: ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/ntp-4.2.8p2-i486-1_slack13.37.txz
Updated package for Slackware x86_64 13.37: ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/ntp-4.2.8p2-x86_64-1_slack13.37.txz
Updated package for Slackware 14.0: ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/ntp-4.2.8p2-i486-1_slack14.0.txz
Updated package for Slackware x86_64 14.0: ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/ntp-4.2.8p2-x86_64-1_slack14.0.txz
Updated package for Slackware 14.1: ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/ntp-4.2.8p2-i486-1_slack14.1.txz
Updated package for Slackware x86_64 14.1: ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/ntp-4.2.8p2-x86_64-1_slack14.1.txz
Updated package for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/ntp-4.2.8p2-i486-1.txz
Updated package for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/ntp-4.2.8p2-x86_64-1.txz
MD5 signatures: +-------------+
Slackware 13.0 package: 570bb3e4bb7b065101fa4963e757d7e7 ntp-4.2.8p2-i486-1_slack13.0.txz
Slackware x86_64 13.0 package: e6add42a70a66496be2d4978370c2799 ntp-4.2.8p2-x86_64-1_slack13.0.txz
Slackware 13.1 package: 99f1cfa5e23a256d840ed0a56b7f9400 ntp-4.2.8p2-i486-1_slack13.1.txz
Slackware x86_64 13.1 package: 0a6622196521e084d36cda13fc6da824 ntp-4.2.8p2-x86_64-1_slack13.1.txz
Slackware 13.37 package: 28cfe042c585cf036582ce5f0c2daadf ntp-4.2.8p2-i486-1_slack13.37.txz
Slackware x86_64 13.37 package: c436da55cd2d113142410a9d982c5ac5 ntp-4.2.8p2-x86_64-1_slack13.37.txz
Slackware 14.0 package: cf69f8ecb5e4c1902dfb22d0f9685278 ntp-4.2.8p2-i486-1_slack14.0.txz
Slackware x86_64 14.0 package: 9c8344ec56d5d2335fd7370e2f9cf639 ntp-4.2.8p2-x86_64-1_slack14.0.txz
Slackware 14.1 package: 9dcf0eafa851ad018f8341c2fb9307b5 ntp-4.2.8p2-i486-1_slack14.1.txz
Slackware x86_64 14.1 package: e0c063f4e46a72ec86012a46299a46df ntp-4.2.8p2-x86_64-1_slack14.1.txz
Slackware -current package: 5f72de16e3bb6cd216e7694a49671cee n/ntp-4.2.8p2-i486-1.txz
Slackware x86_64 -current package: 1ba531770e4a2ae6e8e7116aaa26523e n/ntp-4.2.8p2-x86_64-1.txz
Installation instructions: +------------------------+
Upgrade the package as root:
upgradepkg ntp-4.2.8p2-i486-1_slack14.1.txz
Then, restart the NTP daemon:
sh /etc/rc.d/rc.ntpd restart
+-----+
Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com
+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address.
Release Date: 2015-05-19 Last Updated: 2015-05-19
Potential Security Impact: Remote Denial of Service (DoS), or other vulnerabilities
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP-UX running NTP. These could be exploited remotely to create a Denial of Service (DoS), or other vulnerabilities.
References:
CVE-2015-1798 - Symmetric-Key feature allows MAC address spoofing (CWE-17) CVE-2015-1799 - Symmetric-Key feature allows denial of service (CWE-17) SSRT102029 CERT-VU#852879
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
HP-UX B.11.31 running NTP v4.x, specifically version C.4.2.6.5.0 or previous
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2015-1798 (AV:A/AC:H/Au:N/C:N/I:P/A:N) 1.8 CVE-2015-1799 (AV:A/AC:M/Au:N/C:N/I:P/A:P) 4.3 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has provided the following solution for HP-UX B.11.31.
A new B.11.31 depot for HP-UX-NTP_C.4.2.6.6.0 is available here:
https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber =HPUX-NTP
Reference: http://support.ntp.org/bin/view/Main/SecurityNotice
MANUAL ACTIONS: Yes - Update
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa The following text is for use by the HP-UX Software Assistant.
AFFECTED VERSIONS
HP-UX B.11.31
NTP.INETSVCS2-BOOT NTP.NTP-AUX NTP.NTP-RUN action: install revision C.4.2.6.6.0 or subsequent
END AFFECTED VERSIONS
HISTORY Version:1 (rev.1) - 19 May 2015 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2015 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. Comware 7 (CW7) Products - all versions prior to the fixed versions in the Resolution section below.
-
12500 (Comware 7) - Version: Fix in R7375
- HP Network Products
- JC085A HP A12518 Switch Chassis
- JC086A HP A12508 Switch Chassis
- JC652A HP 12508 DC Switch Chassis
- JC653A HP 12518 DC Switch Chassis
- JC654A HP 12504 AC Switch Chassis
- JC655A HP 12504 DC Switch Chassis
- JF430A HP A12518 Switch Chassis
- JF430B HP 12518 Switch Chassis
- JF430C HP 12518 AC Switch Chassis
- JF431A HP A12508 Switch Chassis
- JF431B HP 12508 Switch Chassis
- JF431C HP 12508 AC Switch Chassis
- JC072B HP 12500 Main Processing Unit
- JG497A HP 12500 MPU w/Comware V7 OS
- JG782A HP FF 12508E AC Switch Chassis
- JG783A HP FF 12508E DC Switch Chassis
- JG784A HP FF 12518E AC Switch Chassis
- JG785A HP FF 12518E DC Switch Chassis
- JG802A HP FF 12500E MPU
- JG803A HP FlexFabric 12500E TAA-compliant Main Processing Unit
-
10500 (Comware 7) - Version: Fix in R7169P01
- HP Network Products
- JC611A HP 10508-V Switch Chassis
- JC612A HP 10508 Switch Chassis
- JC613A HP 10504 Switch Chassis
- JC748A HP 10512 Switch Chassis
- JG820A HP 10504 TAA Switch Chassis
- JG821A HP 10508 TAA Switch Chassis
- JG822A HP 10508-V TAA Switch Chassis
- JG823A HP 10512 TAA Switch Chassis
- JG496A HP 10500 Type A MPU w/Comware v7 OS
- JH198A HP 10500 Type D Main Processing Unit with Comware v7 Operating System
- JH206A HP 10500 Type D TAA w/Comware v7 OS MPU
-
12900 (Comware 7) - Version: Fix in R1137
- HP Network Products
- JG619A HP FlexFabric 12910 Switch AC Chassis
- JG621A HP FlexFabric 12910 Main Processing Unit
- JG632A HP FlexFabric 12916 Switch AC Chassis
- JG634A HP FlexFabric 12916 Main Processing Unit
- JH104A HP FlexFabric 12900E Main Processing Unit
- JH114A HP FlexFabric 12910 TAA-compliant Main Processing Unit
- JH263A HP FlexFabric 12904E Main Processing Unit
- JH255A HP FlexFabric 12908E Switch Chassis
- JH262A HP FlexFabric 12904E Switch Chassis
- JH113A HP FlexFabric 12910 TAA-compliant Switch AC Chassis
- JH103A HP FlexFabric 12916E Switch Chassis
-
5900 (Comware 7) - Version: Fix in R2422P01
- HP Network Products
- JC772A HP 5900AF-48XG-4QSFP+ Switch
- JG336A HP 5900AF-48XGT-4QSFP+ Switch
- JG510A HP 5900AF-48G-4XG-2QSFP+ Switch
- JG554A HP 5900AF-48XG-4QSFP+ TAA Switch
- JG838A HP FF 5900CP-48XG-4QSFP+ Switch
- JH036A HP FlexFabric 5900CP 48XG 4QSFP+ TAA-Compliant
- JH037A HP 5900AF 48XGT 4QSFP+ TAA-Compliant Switch
- JH038A HP 5900AF 48G 4XG 2QSFP+ TAA-Compliant
- JG296A HP 5920AF-24XG Switch
- JG555A HP 5920AF-24XG TAA Switch
-
MSR1000 (Comware 7) - Version: Fix in R0106P33
- HP Network Products
- JG875A HP MSR1002-4 AC Router
- JH060A HP MSR1003-8S AC Router
-
MSR2000 (Comware 7) - Version: Fix in R0106P33
- HP Network Products
- JG411A HP MSR2003 AC Router
- JG734A HP MSR2004-24 AC Router
- JG735A HP MSR2004-48 Router
- JG866A HP MSR2003 TAA-compliant AC Router
-
MSR3000 (Comware 7) - Version: Fix in R0106P33
- HP Network Products
- JG404A HP MSR3064 Router
- JG405A HP MSR3044 Router
- JG406A HP MSR3024 AC Router
- JG407A HP MSR3024 DC Router
- JG408A HP MSR3024 PoE Router
- JG409A HP MSR3012 AC Router
- JG410A HP MSR3012 DC Router
- JG861A HP MSR3024 TAA-compliant AC Router
-
MSR4000 (Comware 7) - Version: Fix in R0106P33
- HP Network Products
- JG402A HP MSR4080 Router Chassis
- JG403A HP MSR4060 Router Chassis
- JG412A HP MSR4000 MPU-100 Main Processing Unit
- JG869A HP MSR4000 TAA-compliant MPU-100 Main Processing Unit
-
5800 (Comware 7) - Version: Fix in R7006P15
- HP Network Products
- JC099A HP 5800-24G-PoE Switch
- JC099B HP 5800-24G-PoE+ Switch
- JC100A HP 5800-24G Switch
- JC100B HP 5800-24G Switch
- JC101A HP 5800-48G Switch with 2 Slots
- JC101B HP 5800-48G-PoE+ Switch with 2 Interface Slots
- JC103A HP 5800-24G-SFP Switch
- JC103B HP 5800-24G-SFP Switch with 1 Interface Slot
- JC104A HP 5800-48G-PoE Switch
- JC104B HP 5800-48G-PoE+ Switch with 1 Interface Slot
- JC105A HP 5800-48G Switch
- JC105B HP 5800-48G Switch with 1 Interface Slot
- JG254A HP 5800-24G-PoE+ TAA-compliant Switch
- JG254B HP 5800-24G-PoE+ TAA-compliant Switch
- JG255A HP 5800-24G TAA-compliant Switch
- JG255B HP 5800-24G TAA-compliant Switch
- JG256A HP 5800-24G-SFP TAA-compliant Switch with 1 Interface
- JG256B HP 5800-24G-SFP TAA-compliant Switch with 1 Interface
- JG257A HP 5800-48G-PoE+ TAA-compliant Switch with 1 Interface
- JG257B HP 5800-48G-PoE+ TAA-compliant Switch with 1 Interface
- JG258A HP 5800-48G TAA-compliant Switch with 1 Interface Slot
- JG258B HP 5800-48G TAA-compliant Switch with 1 Interface Slot
- JG225A HP 5800AF-48G Switch
- JG225B HP 5800AF-48G Switch
- JG242A HP 5800-48G-PoE+ TAA-compliant Switch with 2 Interface
- JG242B HP 5800-48G-PoE+ TAA-compliant Switch with 2 Interface
- JG243A HP 5820-24XG-SFP+ TAA-compliant Switch
- JG243B HP 5820-24XG-SFP+ TAA-compliant Switch
- JG259A HP 5820X-14XG-SFP+ TAA-compliant Switch with 2 Interface Slots & 1 OAA Slot
- JG259B HP 5820-14XG-SFP+ TAA-compliant Switch with 2 Interface Slots and 1 OAA Slot
- JC106A HP 5820-14XG-SFP+ Switch with 2 Slots
- JC106B HP 5820-14XG-SFP+ Switch with 2 Interface Slots & 1 OAA Slot
- JG219A HP 5820AF-24XG Switch
- JG219B HP 5820AF-24XG Switch
- JC102A HP 5820-24XG-SFP+ Switch
- JC102B HP 5820-24XG-SFP+ Switch
-
VSR (Comware 7) - Version: Fix in E0321
- HP Network Products
- JG810AAE HP VSR1001 Virtual Services Router 60 Day Evaluation Software
- JG811AAE HP VSR1001 Comware 7 Virtual Services Router
- JG812AAE HP VSR1004 Comware 7 Virtual Services Router
- JG813AAE HP VSR1008 Comware 7 Virtual Services Router
-
7900 (Comware 7) - Version: Fix in R2137
- HP Network Products
- JG682A HP FlexFabric 7904 Switch Chassis
- JG841A HP FlexFabric 7910 Switch Chassis
- JG842A HP FlexFabric 7910 7.2Tbps Fabric / Main Processing Unit
- JH001A HP FlexFabric 7910 2.4Tbps Fabric / Main Processing Unit
- JH122A HP FlexFabric 7904 TAA-compliant Switch Chassis
- JH123A HP FlexFabric 7910 TAA-compliant Switch Chassis
- JH124A HP FlexFabric 7910 7.2Tbps TAA-compliant Fabric/Main Processing Unit
- JH125A HP FlexFabric 7910 2.4Tbps TAA-compliant Fabric/Main Processing Unit
-
5130 (Comware 7) - Version: Fix in R3109P05
- HP Network Products
- JG932A HP 5130-24G-4SFP+ EI Switch
- JG933A HP 5130-24G-SFP-4SFP+ EI Switch
- JG934A HP 5130-48G-4SFP+ EI Switch
- JG936A HP 5130-24G-PoE+-4SFP+ (370W) EI Switch
- JG937A HP 5130-48G-PoE+-4SFP+ (370W) EI Switch
- JG975A HP 5130-24G-4SFP+ EI Brazil Switch
- JG976A HP 5130-48G-4SFP+ EI Brazil Switch
- JG977A HP 5130-24G-PoE+-4SFP+ (370W) EI Brazil Switch
- JG978A HP 5130-48G-PoE+-4SFP+ (370W) EI Brazil Switch
- JG938A HP 5130-24G-2SFP+-2XGT EI Switch
- JG939A HP 5130-48G-2SFP+-2XGT EI Switch
- JG940A HP 5130-24G-PoE+-2SFP+-2XGT (370W) EI Switch
- JG941A HP 5130-48G-PoE+-2SFP+-2XGT (370W) EI Switch
-
5700 (Comware 7) - Version: Fix in R2422P01
- HP Network Products
- JG894A HP FlexFabric 5700-48G-4XG-2QSFP+ Switch
- JG895A HP FlexFabric 5700-48G-4XG-2QSFP+ TAA-compliant Switch
- JG896A HP FlexFabric 5700-40XG-2QSFP+ Switch
- JG897A HP FlexFabric 5700-40XG-2QSFP+ TAA-compliant Switch
- JG898A HP FlexFabric 5700-32XGT-8XG-2QSFP+ Switch
- JG899A HP FlexFabric 5700-32XGT-8XG-2QSFP+ TAA-compliant Switch
-
5930 (Comware 7) - Version: Fix in R2422P01
- HP Network Products
- JG726A HP FlexFabric 5930 32QSFP+ Switch
- JG727A HP FlexFabric 5930 32QSFP+ TAA-compliant Switch
- JH178A HP FlexFabric 5930 2QSFP+ 2-slot Switch
- JH179A HP FlexFabric 5930 4-slot Switch
- JH187A HP FlexFabric 5930 2QSFP+ 2-slot TAA-compliant Switch
- JH188A HP FlexFabric 5930 4-slot TAA-compliant Switch
HISTORY Version:1 (rev.1) - 8 March 2016 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1798 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1799 http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities
Updated Packages:
Mandriva Business Server 1/X86_64: b0f98e6b8700e3e3413582fe28d1ba06 mbs1/x86_64/ntp-4.2.6p5-8.4.mbs1.x86_64.rpm d864780718c95368bf9ec81643e35e5d mbs1/x86_64/ntp-client-4.2.6p5-8.4.mbs1.x86_64.rpm 6f457df52d46fb8e6b0fe44aead752eb mbs1/x86_64/ntp-doc-4.2.6p5-8.4.mbs1.x86_64.rpm b4bff3de733ea6d2839a77a9211ce02b mbs1/SRPMS/ntp-4.2.6p5-8.4.mbs1.src.rpm
Mandriva Business Server 2/X86_64: e9ac2f3465bcc50199aef8a4d553927f mbs2/x86_64/ntp-4.2.6p5-16.3.mbs2.x86_64.rpm cf2970c3c56efbfa84f964532ad64544 mbs2/x86_64/ntp-client-4.2.6p5-16.3.mbs2.x86_64.rpm 1ae1b1d3c2e7bdea25c01c33652b6169 mbs2/x86_64/ntp-doc-4.2.6p5-16.3.mbs2.noarch.rpm d250433009fd187361bda6338dc5eede mbs2/SRPMS/ntp-4.2.6p5-16.3.mbs2.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. ============================================================================ Ubuntu Security Notice USN-2567-1 April 13, 2015
ntp vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in NTP. This issue could either cause ntp-keygen to hang, or could result in non-random keys. (CVE number pending)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.10: ntp 1:4.2.6.p5+dfsg-3ubuntu2.14.10.3
Ubuntu 14.04 LTS: ntp 1:4.2.6.p5+dfsg-3ubuntu2.14.04.3
Ubuntu 12.04 LTS: ntp 1:4.2.6.p3+dfsg-1ubuntu3.4
In general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: ntp security, bug fix, and enhancement update Advisory ID: RHSA-2015:2231-04 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-2231.html Issue date: 2015-11-19 CVE Names: CVE-2014-9297 CVE-2014-9298 CVE-2014-9750 CVE-2014-9751 CVE-2015-1798 CVE-2015-1799 CVE-2015-3405 =====================================================================
- Summary:
Updated ntp packages that fix multiple security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64
- Description:
The Network Time Protocol (NTP) is used to synchronize a computer's time with another referenced time source. These packages include the ntpd service which continuously adjusts system time and utilities used to query and configure the ntpd service.
It was found that because NTP's access control was based on a source IP address, an attacker could bypass source IP restrictions and send malicious control and configuration packets by spoofing ::1 addresses. (CVE-2014-9298, CVE-2014-9751)
A denial of service flaw was found in the way NTP hosts that were peering with each other authenticated themselves before updating their internal state variables. An attacker could send packets to one peer host, which could cascade to other peers, and stop the synchronization process among the reached peers. (CVE-2015-1799)
A flaw was found in the way the ntp-keygen utility generated MD5 symmetric keys on big-endian systems. An attacker could possibly use this flaw to guess generated MD5 keys, which could then be used to spoof an NTP client or server. (CVE-2015-3405)
A stack-based buffer overflow was found in the way the NTP autokey protocol was implemented. When an NTP client decrypted a secret received from an NTP server, it could cause that client to crash. (CVE-2014-9297, CVE-2014-9750)
It was found that ntpd did not check whether a Message Authentication Code (MAC) was present in a received packet when ntpd was configured to use symmetric cryptographic keys. A man-in-the-middle attacker could use this flaw to send crafted packets that would be accepted by a client or a peer without the attacker knowing the symmetric key. (CVE-2015-1798)
The CVE-2015-1798 and CVE-2015-1799 issues were discovered by Miroslav Lichvár of Red Hat.
Bug fixes:
-
The ntpd service truncated symmetric keys specified in the key file to 20 bytes. As a consequence, it was impossible to configure NTP authentication to work with peers that use longer keys. With this update, the maximum key length has been changed to 32 bytes. (BZ#1191111)
-
The ntpd service could previously join multicast groups only when starting, which caused problems if ntpd was started during system boot before network was configured. With this update, ntpd attempts to join multicast groups every time network configuration is changed. (BZ#1207014)
-
Previously, the ntp-keygen utility used the exponent of 3 when generating RSA keys. Consequently, generating RSA keys failed when FIPS mode was enabled. With this update, ntp-keygen has been modified to use the exponent of 65537, and generating keys in FIPS mode now works as expected. (BZ#1191116)
-
The ntpd service dropped incoming NTP packets if their source port was lower than 123 (the NTP port). With this update, ntpd no longer checks the source port number, and clients behind NAT are now able to correctly synchronize with the server. (BZ#1171640)
Enhancements:
-
This update adds support for configurable Differentiated Services Code Points (DSCP) in NTP packets, simplifying configuration in large networks where different NTP implementations or versions are using different DSCP values. (BZ#1202828)
-
This update adds the ability to configure separate clock stepping thresholds for each direction (backward and forward). Use the "stepback" and "stepfwd" options to configure each threshold. (BZ#1193154)
-
Support for nanosecond resolution has been added to the Structural Health Monitoring (SHM) reference clock. Prior to this update, when a Precision Time Protocol (PTP) hardware clock was used as a time source to synchronize the system clock, the accuracy of the synchronization was limited due to the microsecond resolution of the SHM protocol. The nanosecond extension in the SHM protocol now allows sub-microsecond synchronization of the system clock. (BZ#1117702)
All ntp users are advised to upgrade to these updated packages, which contain backported patches to correct these issues and add these enhancements.
- Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1117702 - SHM refclock doesn't support nanosecond resolution 1122012 - SHM refclock allows only two units with owner-only access 1171640 - NTP drops requests when sourceport is below 123 1180721 - ntp: mreadvar command crash in ntpq 1184572 - CVE-2014-9298 CVE-2014-9751 ntp: drop packets with source address ::1 1184573 - CVE-2014-9297 CVE-2014-9750 ntp: vallen in extension fields are not validated 1191108 - ntpd should warn when monitoring facility can't be disabled due to restrict configuration 1191122 - ntpd -x steps clock on leap second 1193154 - permit differential fwd/back threshold for step vs. Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: ntp-4.2.6p5-22.el7.src.rpm
x86_64: ntp-4.2.6p5-22.el7.x86_64.rpm ntp-debuginfo-4.2.6p5-22.el7.x86_64.rpm ntpdate-4.2.6p5-22.el7.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
noarch: ntp-doc-4.2.6p5-22.el7.noarch.rpm ntp-perl-4.2.6p5-22.el7.noarch.rpm
x86_64: ntp-debuginfo-4.2.6p5-22.el7.x86_64.rpm sntp-4.2.6p5-22.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: ntp-4.2.6p5-22.el7.src.rpm
x86_64: ntp-4.2.6p5-22.el7.x86_64.rpm ntp-debuginfo-4.2.6p5-22.el7.x86_64.rpm ntpdate-4.2.6p5-22.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
noarch: ntp-doc-4.2.6p5-22.el7.noarch.rpm ntp-perl-4.2.6p5-22.el7.noarch.rpm
x86_64: ntp-debuginfo-4.2.6p5-22.el7.x86_64.rpm sntp-4.2.6p5-22.el7.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: ntp-4.2.6p5-22.el7.src.rpm
aarch64: ntp-4.2.6p5-22.el7.aarch64.rpm ntp-debuginfo-4.2.6p5-22.el7.aarch64.rpm ntpdate-4.2.6p5-22.el7.aarch64.rpm
ppc64: ntp-4.2.6p5-22.el7.ppc64.rpm ntp-debuginfo-4.2.6p5-22.el7.ppc64.rpm ntpdate-4.2.6p5-22.el7.ppc64.rpm
ppc64le: ntp-4.2.6p5-22.el7.ppc64le.rpm ntp-debuginfo-4.2.6p5-22.el7.ppc64le.rpm ntpdate-4.2.6p5-22.el7.ppc64le.rpm
s390x: ntp-4.2.6p5-22.el7.s390x.rpm ntp-debuginfo-4.2.6p5-22.el7.s390x.rpm ntpdate-4.2.6p5-22.el7.s390x.rpm
x86_64: ntp-4.2.6p5-22.el7.x86_64.rpm ntp-debuginfo-4.2.6p5-22.el7.x86_64.rpm ntpdate-4.2.6p5-22.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
aarch64: ntp-debuginfo-4.2.6p5-22.el7.aarch64.rpm sntp-4.2.6p5-22.el7.aarch64.rpm
noarch: ntp-doc-4.2.6p5-22.el7.noarch.rpm ntp-perl-4.2.6p5-22.el7.noarch.rpm
ppc64: ntp-debuginfo-4.2.6p5-22.el7.ppc64.rpm sntp-4.2.6p5-22.el7.ppc64.rpm
ppc64le: ntp-debuginfo-4.2.6p5-22.el7.ppc64le.rpm sntp-4.2.6p5-22.el7.ppc64le.rpm
s390x: ntp-debuginfo-4.2.6p5-22.el7.s390x.rpm sntp-4.2.6p5-22.el7.s390x.rpm
x86_64: ntp-debuginfo-4.2.6p5-22.el7.x86_64.rpm sntp-4.2.6p5-22.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: ntp-4.2.6p5-22.el7.src.rpm
x86_64: ntp-4.2.6p5-22.el7.x86_64.rpm ntp-debuginfo-4.2.6p5-22.el7.x86_64.rpm ntpdate-4.2.6p5-22.el7.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
noarch: ntp-doc-4.2.6p5-22.el7.noarch.rpm ntp-perl-4.2.6p5-22.el7.noarch.rpm
x86_64: ntp-debuginfo-4.2.6p5-22.el7.x86_64.rpm sntp-4.2.6p5-22.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2014-9297 https://access.redhat.com/security/cve/CVE-2014-9298 https://access.redhat.com/security/cve/CVE-2014-9750 https://access.redhat.com/security/cve/CVE-2014-9751 https://access.redhat.com/security/cve/CVE-2015-1798 https://access.redhat.com/security/cve/CVE-2015-1799 https://access.redhat.com/security/cve/CVE-2015-3405 https://access.redhat.com/security/updates/classification/#moderate
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD4DBQFWTkFJXlSAg2UNWIIRAphzAKCRHDVdHI5OvJ8glkXYLBwyQgeyvwCYmTV3 1hLTu5I/PUzWOnD8rRIlZQ== =sWdG -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce. This could allow a remote attacker to cause a denial of service by impeding synchronization between NTP peers.
Additionally, it was discovered that generating MD5 keys using ntp-keygen on big endian machines would either trigger an endless loop, or generate non-random keys.
For the stable distribution (wheezy), these problems have been fixed in version 1:4.2.6.p5+dfsg-2+deb7u4.
For the unstable distribution (sid), these problems have been fixed in version 1:4.2.6.p5+dfsg-7.
We recommend that you upgrade your ntp packages. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
APPLE-SA-2015-06-30-2 OS X Yosemite v10.10.4 and Security Update 2015-005
OS X Yosemite v10.10.4 and Security Update 2015-005 are now available and address the following:
Admin Framework Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.3 Impact: A process may gain admin privileges without proper authentication Description: An issue existed when checking XPC entitlements. This issue was addressed through improved entitlement checking. CVE-ID CVE-2015-3671 : Emil Kvarnhammar at TrueSec
Admin Framework Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.3 Impact: A non-admin user may obtain admin rights Description: An issue existed in the handling of user authentication. This issue was addressed through improved error checking. CVE-ID CVE-2015-3672 : Emil Kvarnhammar at TrueSec
Admin Framework Available for: OS X Yosemite v10.10 to v10.10.3 Impact: An attacker may abuse Directory Utility to gain root privileges Description: Directory Utility was able to be moved and modified to achieve code execution within an entitled process. This issue was addressed by limiting the disk location that writeconfig clients may be executed from. CVE-ID CVE-2015-3673 : Patrick Wardle of Synack, Emil Kvarnhammar at TrueSec
afpserver Available for: OS X Yosemite v10.10 to v10.10.3 Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the AFP server. This issue was addressed through improved memory handling. CVE-ID CVE-2015-3674 : Dean Jerkovich of NCC Group
apache Available for: OS X Yosemite v10.10 to v10.10.3 Impact: An attacker may be able to access directories that are protected with HTTP authentication without knowing the correct credentials Description: The default Apache configuration did not include mod_hfs_apple. If Apache was manually enabled and the configuration was not changed, some files that should not be accessible might have been accessible using a specially crafted URL. This issue was addressed by enabling mod_hfs_apple. CVE-ID CVE-2015-3675 : Apple
apache Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.3 Impact: Multiple vulnerabilities exist in PHP, the most serious of which may lead to arbitrary code execution Description: Multiple vulnerabilities existed in PHP versions prior to 5.5.24 and 5.4.40. These were addressed by updating PHP to versions 5.5.24 and 5.4.40. CVE-ID CVE-2015-0235 CVE-2015-0273
AppleGraphicsControl Available for: OS X Yosemite v10.10 to v10.10.3 Impact: A malicious application may be able to determine kernel memory layout Description: An issue existed in AppleGraphicsControl which could have led to the disclosure of kernel memory layout. This issue was addressed through improved bounds checking. CVE-ID CVE-2015-3676 : Chen Liang of KEEN Team
AppleFSCompression Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.3 Impact: A malicious application may be able to determine kernel memory layout Description: An issue existed in LZVN compression that could have led to the disclosure of kernel memory content. This issue was addressed through improved memory handling. CVE-ID CVE-2015-3677 : an anonymous researcher working with HP's Zero Day Initiative
AppleThunderboltEDMService Available for: OS X Yosemite v10.10 to v10.10.3 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in the handling of certain Thunderbolt commands from local processes. This issue was addressed through improved memory handling. CVE-ID CVE-2015-3678 : Apple
ATS Available for: OS X Yosemite v10.10 to v10.10.3 Impact: Processing a maliciously crafted font file may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in handling of certain fonts. These issues were addressed through improved memory handling. CVE-ID CVE-2015-3679 : Pawel Wylecial working with HP's Zero Day Initiative CVE-2015-3680 : Pawel Wylecial working with HP's Zero Day Initiative CVE-2015-3681 : John Villamil (@day6reak), Yahoo Pentest Team CVE-2015-3682 : Nuode Wei
Bluetooth Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.3 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in the Bluetooth HCI interface. This issue was addressed through improved memory handling. CVE-ID CVE-2015-3683 : Roberto Paleari and Aristide Fattori of Emaze Networks
Certificate Trust Policy Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.3 Impact: An attacker with a privileged network position may be able to intercept network traffic Description: An intermediate certificate was incorrectly issued by the certificate authority CNNIC. This issue was addressed through the addition of a mechanism to trust only a subset of certificates issued prior to the mis-issuance of the intermediate. Further details are available at https://support.apple.com/en-us/HT204938
Certificate Trust Policy Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.3 Description: The certificate trust policy was updated. The complete list of certificates may be viewed at https://support.apple.com/en- us/HT202858.
CFNetwork HTTPAuthentication Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.3 Impact: Following a maliciously crafted URL may lead to arbitrary code execution Description: A memory corruption issue existed in handling of certain URL credentials. This issue was addressed through improved memory handling. CVE-ID CVE-2015-3684 : Apple
CoreText Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.3 Impact: Processing a maliciously crafted text file may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in the processing of text files. These issues were addressed through improved bounds checking. CVE-ID CVE-2015-1157 CVE-2015-3685 : Apple CVE-2015-3686 : John Villamil (@day6reak), Yahoo Pentest Team CVE-2015-3687 : John Villamil (@day6reak), Yahoo Pentest Team CVE-2015-3688 : John Villamil (@day6reak), Yahoo Pentest Team CVE-2015-3689 : Apple
coreTLS Available for: OS X Yosemite v10.10 to v10.10.3 Impact: An attacker with a privileged network position may intercept SSL/TLS connections Description: coreTLS accepted short ephemeral Diffie-Hellman (DH) keys, as used in export-strength ephemeral DH cipher suites. This issue, also known as Logjam, allowed an attacker with a privileged network position to downgrade security to 512-bit DH if the server supported an export-strength ephemeral DH cipher suite. The issue was addressed by increasing the default minimum size allowed for DH ephemeral keys to 768 bits. CVE-ID CVE-2015-4000 : The weakdh team at weakdh.org, Hanno Boeck
DiskImages Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.3 Impact: A malicious application may be able to determine kernel memory layout Description: An information disclosure issue existed in the processing of disk images. This issue was addressed through improved memory management. CVE-ID CVE-2015-3690 : Peter Rutenbar working with HP's Zero Day Initiative
Display Drivers Available for: OS X Yosemite v10.10 to v10.10.3 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: An issue existed in the Monitor Control Command Set kernel extension by which a userland process could control the value of a function pointer within the kernel. The issue was addressed by removing the affected interface. CVE-ID CVE-2015-3691 : Roberto Paleari and Aristide Fattori of Emaze Networks
EFI Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.3 Impact: A malicious application with root privileges may be able to modify EFI flash memory Description: An insufficient locking issue existed with EFI flash when resuming from sleep states. This issue was addressed through improved locking. CVE-ID CVE-2015-3692 : Trammell Hudson of Two Sigma Investments, Xeno Kovah and Corey Kallenberg of LegbaCore LLC, Pedro Vilaca
EFI Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.3 Impact: A malicious application may induce memory corruption to escalate privileges Description: A disturbance error, also known as Rowhammer, exists with some DDR3 RAM that could have led to memory corruption. This issue was mitigated by increasing memory refresh rates. CVE-ID CVE-2015-3693 : Mark Seaborn and Thomas Dullien of Google, working from original research by Yoongu Kim et al (2014)
FontParser Available for: OS X Yosemite v10.10 to v10.10.3 Impact: Processing a maliciously crafted font file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation. CVE-ID CVE-2015-3694 : John Villamil (@day6reak), Yahoo Pentest Team
Graphics Driver Available for: OS X Yosemite v10.10 to v10.10.3 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: An out of bounds write issue existed in NVIDIA graphics driver. This issue was addressed through improved bounds checking. CVE-ID CVE-2015-3712 : Ian Beer of Google Project Zero
Intel Graphics Driver Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.3 Impact: Multiple buffer overflow issues exist in the Intel graphics driver, the most serious of which may lead to arbitrary code execution with system privileges Description: Multiple buffer overflow issues existed in the Intel graphics driver. These were addressed through additional bounds checks. CVE-ID CVE-2015-3695 : Ian Beer of Google Project Zero CVE-2015-3696 : Ian Beer of Google Project Zero CVE-2015-3697 : Ian Beer of Google Project Zero CVE-2015-3698 : Ian Beer of Google Project Zero CVE-2015-3699 : Ian Beer of Google Project Zero CVE-2015-3700 : Ian Beer of Google Project Zero CVE-2015-3701 : Ian Beer of Google Project Zero CVE-2015-3702 : KEEN Team
ImageIO Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.3 Impact: Multiple vulnerabilities existed in libtiff, the most serious of which may lead to arbitrary code execution Description: Multiple vulnerabilities existed in libtiff versions prior to 4.0.4. They were addressed by updating libtiff to version 4.0.4. CVE-ID CVE-2014-8127 CVE-2014-8128 CVE-2014-8129 CVE-2014-8130
ImageIO Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.3 Impact: Processing a maliciously crafted .tiff file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the processing of .tiff files. This issue was addressed through improved bounds checking. CVE-ID CVE-2015-3703 : Apple
Install Framework Legacy Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.3 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: Several issues existed in how Install.framework's 'runner' setuid binary dropped privileges. This was addressed by properly dropping privileges. CVE-ID CVE-2015-3704 : Ian Beer of Google Project Zero
IOAcceleratorFamily Available for: OS X Yosemite v10.10 to v10.10.3 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: Multiple memory corruption issues existed in IOAcceleratorFamily. These issues were addressed through improved memory handling. CVE-ID CVE-2015-3705 : KEEN Team CVE-2015-3706 : KEEN Team
IOFireWireFamily Available for: OS X Yosemite v10.10 to v10.10.3 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: Multiple null pointer dereference issues existed in the FireWire driver. These issues were addressed through improved error checking. CVE-ID CVE-2015-3707 : Roberto Paleari and Aristide Fattori of Emaze Networks
Kernel Available for: OS X Yosemite v10.10 to v10.10.3 Impact: A malicious application may be able to determine kernel memory layout Description: A memory management issue existed in the handling of APIs related to kernel extensions which could have led to the disclosure of kernel memory layout. This issue was addressed through improved memory management. CVE-ID CVE-2015-3720 : Stefan Esser
Kernel Available for: OS X Yosemite v10.10 to v10.10.3 Impact: A malicious application may be able to determine kernel memory layout Description: A memory management issue existed in the handling of HFS parameters which could have led to the disclosure of kernel memory layout. This issue was addressed through improved memory management. CVE-ID CVE-2015-3721 : Ian Beer of Google Project Zero
kext tools Available for: OS X Yosemite v10.10 to v10.10.3 Impact: A malicious application may be able to overwrite arbitrary files Description: kextd followed symbolic links while creating a new file. This issue was addressed through improved handling of symbolic links. CVE-ID CVE-2015-3708 : Ian Beer of Google Project Zero
kext tools Available for: OS X Yosemite v10.10 to v10.10.3 Impact: A local user may be able to load unsigned kernel extensions Description: A time-of-check time-of-use (TOCTOU) race condition condition existed while validating the paths of kernel extensions. This issue was addressed through improved checks to validate the path of the kernel extensions. CVE-ID CVE-2015-3709 : Ian Beer of Google Project Zero
Mail Available for: OS X Yosemite v10.10 to v10.10.3 Impact: A maliciously crafted email can replace the message content with an arbitrary webpage when the message is viewed Description: An issue existed in the support for HTML email which allowed message content to be refreshed with an arbitrary webpage. The issue was addressed through restricted support for HTML content. CVE-ID CVE-2015-3710 : Aaron Sigel of vtty.com, Jan Soucek
ntfs Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.3 Impact: A malicious application may be able to determine kernel memory layout Description: An issue existed in NTFS that could have led to the disclosure of kernel memory content. This issue was addressed through improved memory handling. CVE-ID CVE-2015-3711 : Peter Rutenbar working with HP's Zero Day Initiative
ntp Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.3 Impact: An attacker in a privileged position may be able to perform a denial of service attack against two ntp clients Description: Multiple issues existed in the authentication of ntp packets being received by configured end-points. These issues were addressed through improved connection state management. CVE-ID CVE-2015-1798 CVE-2015-1799
OpenSSL Available for: OS X Yosemite v10.10 to v10.10.3 Impact: Multiple issues exist in OpenSSL, including one that may allow an attacker to intercept connections to a server that supports export-grade ciphers Description: Multiple issues existed in OpenSSL 0.9.8zd which were addressed by updating OpenSSL to version 0.9.8zf. CVE-ID CVE-2015-0209 CVE-2015-0286 CVE-2015-0287 CVE-2015-0288 CVE-2015-0289 CVE-2015-0293
QuickTime Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.3 Impact: Processing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in QuickTime. These issues were addressed through improved memory handling. CVE-ID CVE-2015-3661 : G. Geshev working with HP's Zero Day Initiative CVE-2015-3662 : kdot working with HP's Zero Day Initiative CVE-2015-3663 : kdot working with HP's Zero Day Initiative CVE-2015-3666 : Steven Seeley of Source Incite working with HP's Zero Day Initiative CVE-2015-3667 : Ryan Pentney, Richard Johnson of Cisco Talos and Kai Lu of Fortinet's FortiGuard Labs, Ryan Pentney, and Richard Johnson of Cisco Talos and Kai Lu of Fortinet's FortiGuard Labs CVE-2015-3668 : Kai Lu of Fortinet's FortiGuard Labs CVE-2015-3713 : Apple
Security Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.3 Impact: A remote attacker may cause an unexpected application termination or arbitrary code execution Description: An integer overflow existed in the Security framework code for parsing S/MIME e-mail and some other signed or encrypted objects. This issue was addressed through improved validity checking. CVE-ID CVE-2013-1741
Security Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.3 Impact: Tampered applications may not be prevented from launching Description: Apps using custom resource rules may have been susceptible to tampering that would not have invalidated the signature. This issue was addressed with improved resource validation. CVE-ID CVE-2015-3714 : Joshua Pitts of Leviathan Security Group
Security Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.3 Impact: A malicious application may be able to bypass code signing checks Description: An issue existed where code signing did not verify libraries loaded outside the application bundle. This issue was addressed with improved bundle verification. CVE-ID CVE-2015-3715 : Patrick Wardle of Synack
Spotlight Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.3 Impact: Searching for a malicious file with Spotlight may lead to command injection Description: A command injection vulnerability existed in the handling of filenames of photos added to the local photo library. This issue was addressed through improved input validation. CVE-ID CVE-2015-3716 : Apple
SQLite Available for: OS X Yosemite v10.10 to v10.10.3 Impact: A remote attacker may cause an unexpected application termination or arbitrary code execution Description: Multiple buffer overflows existed in SQLite's printf implementation. These issues were addressed through improved bounds checking. CVE-ID CVE-2015-3717 : Peter Rutenbar working with HP's Zero Day Initiative
System Stats Available for: OS X Yosemite v10.10 to v10.10.3 Impact: A malicious app may be able to compromise systemstatsd Description: A type confusion issue existed in systemstatsd's handling of interprocess communication. By sending a maliciously formatted message to systemstatsd, it may have been possible to execute arbitrary code as the systemstatsd process. The issue was addressed through additional type checking. CVE-ID CVE-2015-3718 : Roberto Paleari and Aristide Fattori of Emaze Networks
TrueTypeScaler Available for: OS X Yosemite v10.10 to v10.10.3 Impact: Processing a maliciously crafted font file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation. CVE-ID CVE-2015-3719 : John Villamil (@day6reak), Yahoo Pentest Team
zip Available for: OS X Yosemite v10.10 to v10.10.3 Impact: Extracting a maliciously crafted zip file using the unzip tool may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in the handling of zip files. These issues were addressed through improved memory handling. CVE-ID
CVE-2014-8139 CVE-2014-8140 CVE-2014-8141
OS X Yosemite 10.10.4 includes the security content of Safari 8.0.7. https://support.apple.com/en-us/HT204950
OS X Yosemite 10.10.4 and Security Update 2015-005 may be obtained from the Mac App Store or Apple's Software Downloads web site: http://www.apple.com/support/downloads/
Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2 Comment: GPGTools - http://gpgtools.org
iQIcBAEBCAAGBQJVksFmAAoJEBcWfLTuOo7tV1AQAIYpkOMpHp181b+70sgyZ/Ue mFM527FFGDfLLuIW6LTcBsEFe9cfZxumB8eOFPirTNRK7krsVMo1W+faHXyWOnx7 kbWylHdhaoxnX+A6Gj0vP71V6TNNsTi9+2dmdmHUnwxZ7Ws5QCNKebumUG3MMXXo EKxE5SNSNKyMSSYmliS26cdl8fWrmg9qTxiZQnxjOCrg/CNAolgVIRRfdMUL7i4w aGAyrlJXOxFOuNkqdHX2luccuHFV7aW/dIXQ4MyjiRNl/bWrBQmQlneLLpPdFZlH cMfGa2/baaNaCbU/GqhNKbO4fKYVaqQWzfUrtqX0+bRv2wmOq33ARy9KE23bYTvL U4E9x9z87LsLXGAdjUi6MDe5g87DcmwIEigfF6/EHbDYa/2VvSdIa74XRv/JCN1+ aftHLotin76h4qV/dCAPf5J/Fr/1KFCM0IphhG7p+7fVTfyy7YDXNBiKCEZzLf8U TUWLUCgQhobtakqwzQJ5qyF8u63xzVXj8oeTOw6iiY/BLlj9def5LMm/z6ZKGTyC 3c4+Sy5XvBHZoeiwdcndTVpnFbmmjZRdeqtdW/zX5mHnxXPa3lZiGoBDhHQgIg6J 1tTVtnO1JSLXVYDR6Evx1EH10Vgkt2wAGTLjljSLwtckoEqc78qMAT1G5U4nFffI +gGm5FbAxjxElgA/gbaq =KLda -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201504-0362", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ntp", "scope": "lte", "trust": 1.0, "vendor": "ntp", "version": "4.2.7p444" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "arista", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "freebsd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ntp", "version": null }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.9.5" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.10 to 10.10.3" }, { "model": "ntp", "scope": "lt", "trust": 0.8, "vendor": "ntp", "version": "4.x" }, { "model": "ntp", "scope": "eq", "trust": 0.8, "vendor": "ntp", "version": "3.x" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.8.5" }, { "model": "ntp", "scope": "eq", "trust": 0.8, "vendor": "ntp", "version": "4.2.8p2" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.1.0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.4" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "56003" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.16" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.3" }, { "model": "ids/ips", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "8.3.0.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "7.3" }, { "model": "puredata system for operational analytics", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.13" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "9.3" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6.2" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.50" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.4.1" }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "15.7" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.7.16" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.8" }, { "model": "purview", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "6.3.0.182" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.2" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.16" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.3" }, { "model": "extremexos", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "15.6.4" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.2" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1.0.4" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.4" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.8" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.0.3" }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "15.4.1.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.0.0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.10" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.0.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.0" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.1" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3.5" }, { "model": "extremexos", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "16.1.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "10.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "9.2" }, { "model": "ids/ips", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "8.3.0.350" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "56002" }, { "model": "ios xr software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.7" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.5" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.3" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "76000" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.10.4" }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "21.1" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.75" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.9.5" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.3" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.4.0" }, { "model": "puredata system for operational analytics", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.5" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3" }, { "model": "network convergence system series routers", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.0.1" }, { "model": "extremexos", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "16.2" }, { "model": "unified computing system central software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.1" }, { "model": "network convergence system series routers", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "8.3" }, { "model": "nac", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "6.3.0.182" }, { "model": "automation stratix", "scope": "ne", "trust": 0.3, "vendor": "rockwell", "version": "590015.6.3" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "56001" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.9.5" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "8.0" }, { "model": "security access manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "network time protocol", "scope": "eq", "trust": 0.3, "vendor": "meinberg", "version": "4.2.6" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.0" }, { "model": "netsight", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "6.3.0.0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.1.0" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.8.15" }, { "model": "identifi wireless", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "10.11" }, { "model": "network time protocol", "scope": "eq", "trust": 0.3, "vendor": "meinberg", "version": "4.2.7" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "network time protocol", "scope": "eq", "trust": 0.3, "vendor": "meinberg", "version": "4.2.8" }, { "model": "extremexos", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "21.1.1" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "7.4" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "77100" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.4" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.0.0" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "7" }, { "model": "linux lts", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "14.04" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.8.5" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.4" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "9.0" }, { "model": "automation stratix", "scope": "eq", "trust": 0.3, "vendor": "rockwell", "version": "59000" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "smart analytics system", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "77000" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.68" }, { "model": "purview", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "6.3.0.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.2" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.0" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.2" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.3.0.3" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.12" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.5" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.1" }, { "model": "extremexos", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "16.2.1" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.4.0" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.37" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "14.10" }, { "model": "security access manager for mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0.1.1" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.9.6" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2" }, { "model": "summit wm3000 series", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.3.0" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "14.1" }, { "model": "hp-ux b.11.31", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.3" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.2.6" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.14" }, { "model": "ntp", "scope": "eq", "trust": 0.3, "vendor": "meinberg", "version": "0" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0.0" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.2.0.4" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.15" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.3.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.0" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.8.7" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.1" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.3" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.6" }, { "model": "smartcloud provisioning for software virtual appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.8.6" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "8.2" }, { "model": "nac", "scope": "eq", "trust": 0.3, "vendor": "extremenetworks", "version": "6.3.0.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "8.1" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.11" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.20" }, { "model": "smartcloud entry", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.1" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "8.4" }, { "model": "flex system manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.0.1" }, { "model": "aix", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.9" }, { "model": "identifi wireless", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "10.11.1" }, { "model": "extremexos", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "15.7.2" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.1.9" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "9.1" }, { "model": "smartcloud entry appliance fp", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.0.3" }, { "model": "security network protection", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.0" }, { "model": "unified computing system central software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.1" }, { "model": "netsight", "scope": "ne", "trust": 0.3, "vendor": "extremenetworks", "version": "6.3.0.182" }, { "model": "vios", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2.4.0" }, { "model": "freebsd", "scope": "eq", "trust": 0.3, "vendor": "freebsd", "version": "10.1" } ], "sources": [ { "db": "CERT/CC", "id": "VU#374268" }, { "db": "BID", "id": "73950" }, { "db": "JVNDB", "id": "JVNDB-2015-002116" }, { "db": "NVD", "id": "CVE-2015-1799" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "4.2.7p444", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-1799" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Miroslav Lichv\u0026amp;amp;amp;amp;amp;aacute;r of Red Hat", "sources": [ { "db": "BID", "id": "73950" } ], "trust": 0.3 }, "cve": "CVE-2015-1799", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 5.5, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-1799", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:A/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-1799", "trust": 1.8, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2015-1799", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2015-1799" }, { "db": "JVNDB", "id": "JVNDB-2015-002116" }, { "db": "NVD", "id": "CVE-2015-1799" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer. NTP Project ntpd reference implementation accepts unauthenticated packets with symmetric key cryptography and does not protect symmetric associations against denial of service attacks. NTP of ntpd of ntp_proto.c Inside receive of symmetric-key The function is used even when a specific invalid packet is received. state variable Service operation disruption to perform update ( Sync failure ) There are vulnerabilities that are put into a state. Supplementary information : CWE Vulnerability type by CWE-17: Code ( code ) Has been identified. http://cwe.mitre.org/data/definitions/17.htmlMan-in-the-middle attacks (man-in-the-middle attack) By the source of the peer IP Denial of service by spoofing addresses ( Sync failure ) There is a possibility of being put into a state. NTP is prone to a denial-of-service vulnerability. \nSuccessful exploits may allow the attacker to cause a denial-of-service condition. \n\n\nHere are the details from the Slackware 14.1 ChangeLog:\n+--------------------------+\npatches/packages/ntp-4.2.8p2-i486-1_slack14.1.txz: Upgraded. \n For more information, see:\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1798\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1799\n (* Security fix *)\n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated package for Slackware 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/ntp-4.2.8p2-i486-1_slack13.0.txz\n\nUpdated package for Slackware x86_64 13.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/ntp-4.2.8p2-x86_64-1_slack13.0.txz\n\nUpdated package for Slackware 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/ntp-4.2.8p2-i486-1_slack13.1.txz\n\nUpdated package for Slackware x86_64 13.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/ntp-4.2.8p2-x86_64-1_slack13.1.txz\n\nUpdated package for Slackware 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/ntp-4.2.8p2-i486-1_slack13.37.txz\n\nUpdated package for Slackware x86_64 13.37:\nftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/ntp-4.2.8p2-x86_64-1_slack13.37.txz\n\nUpdated package for Slackware 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/ntp-4.2.8p2-i486-1_slack14.0.txz\n\nUpdated package for Slackware x86_64 14.0:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/ntp-4.2.8p2-x86_64-1_slack14.0.txz\n\nUpdated package for Slackware 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/ntp-4.2.8p2-i486-1_slack14.1.txz\n\nUpdated package for Slackware x86_64 14.1:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/ntp-4.2.8p2-x86_64-1_slack14.1.txz\n\nUpdated package for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/ntp-4.2.8p2-i486-1.txz\n\nUpdated package for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/ntp-4.2.8p2-x86_64-1.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 13.0 package:\n570bb3e4bb7b065101fa4963e757d7e7 ntp-4.2.8p2-i486-1_slack13.0.txz\n\nSlackware x86_64 13.0 package:\ne6add42a70a66496be2d4978370c2799 ntp-4.2.8p2-x86_64-1_slack13.0.txz\n\nSlackware 13.1 package:\n99f1cfa5e23a256d840ed0a56b7f9400 ntp-4.2.8p2-i486-1_slack13.1.txz\n\nSlackware x86_64 13.1 package:\n0a6622196521e084d36cda13fc6da824 ntp-4.2.8p2-x86_64-1_slack13.1.txz\n\nSlackware 13.37 package:\n28cfe042c585cf036582ce5f0c2daadf ntp-4.2.8p2-i486-1_slack13.37.txz\n\nSlackware x86_64 13.37 package:\nc436da55cd2d113142410a9d982c5ac5 ntp-4.2.8p2-x86_64-1_slack13.37.txz\n\nSlackware 14.0 package:\ncf69f8ecb5e4c1902dfb22d0f9685278 ntp-4.2.8p2-i486-1_slack14.0.txz\n\nSlackware x86_64 14.0 package:\n9c8344ec56d5d2335fd7370e2f9cf639 ntp-4.2.8p2-x86_64-1_slack14.0.txz\n\nSlackware 14.1 package:\n9dcf0eafa851ad018f8341c2fb9307b5 ntp-4.2.8p2-i486-1_slack14.1.txz\n\nSlackware x86_64 14.1 package:\ne0c063f4e46a72ec86012a46299a46df ntp-4.2.8p2-x86_64-1_slack14.1.txz\n\nSlackware -current package:\n5f72de16e3bb6cd216e7694a49671cee n/ntp-4.2.8p2-i486-1.txz\n\nSlackware x86_64 -current package:\n1ba531770e4a2ae6e8e7116aaa26523e n/ntp-4.2.8p2-x86_64-1.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the package as root:\n# upgradepkg ntp-4.2.8p2-i486-1_slack14.1.txz\n\nThen, restart the NTP daemon:\n\n# sh /etc/rc.d/rc.ntpd restart\n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list: |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message: |\n| |\n| unsubscribe slackware-security |\n| |\n| You will get a confirmation message back containing instructions to |\n| complete the process. Please do not reply to this email address. \n\nRelease Date: 2015-05-19\nLast Updated: 2015-05-19\n\nPotential Security Impact: Remote Denial of Service (DoS), or other\nvulnerabilities\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified with HP-UX running\nNTP. These could be exploited remotely to create a Denial of Service (DoS),\nor other vulnerabilities. \n\nReferences:\n\nCVE-2015-1798 - Symmetric-Key feature allows MAC address spoofing (CWE-17)\nCVE-2015-1799 - Symmetric-Key feature allows denial of service (CWE-17)\nSSRT102029\nCERT-VU#852879\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n\nHP-UX B.11.31 running NTP v4.x, specifically version C.4.2.6.5.0 or previous\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2015-1798 (AV:A/AC:H/Au:N/C:N/I:P/A:N) 1.8\nCVE-2015-1799 (AV:A/AC:M/Au:N/C:N/I:P/A:P) 4.3\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided the following solution for HP-UX B.11.31. \n\nA new B.11.31 depot for HP-UX-NTP_C.4.2.6.6.0 is available here:\n\nhttps://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber\n=HPUX-NTP\n\nReference: http://support.ntp.org/bin/view/Main/SecurityNotice\n\nMANUAL ACTIONS: Yes - Update\n\nPRODUCT SPECIFIC INFORMATION\n\nHP-UX Software Assistant: HP-UX Software Assistant is an enhanced application\nthat replaces HP-UX Security Patch Check. It analyzes all Security Bulletins\nissued by HP and lists recommended actions that may apply to a specific HP-UX\nsystem. It can also download patches and create a depot automatically. For\nmore information see: https://www.hp.com/go/swa\nThe following text is for use by the HP-UX Software Assistant. \n\nAFFECTED VERSIONS\n\nHP-UX B.11.31\n==================\nNTP.INETSVCS2-BOOT\nNTP.NTP-AUX\nNTP.NTP-RUN\naction: install revision C.4.2.6.6.0 or subsequent\n\nEND AFFECTED VERSIONS\n\nHISTORY\nVersion:1 (rev.1) - 19 May 2015 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2015 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. \nComware 7 (CW7) Products - all versions prior to the fixed versions in the\nResolution section below. \n\n + **12500 (Comware 7) - Version: Fix in R7375**\n * HP Network Products\n - JC085A HP A12518 Switch Chassis\n - JC086A HP A12508 Switch Chassis\n - JC652A HP 12508 DC Switch Chassis\n - JC653A HP 12518 DC Switch Chassis\n - JC654A HP 12504 AC Switch Chassis\n - JC655A HP 12504 DC Switch Chassis\n - JF430A HP A12518 Switch Chassis\n - JF430B HP 12518 Switch Chassis\n - JF430C HP 12518 AC Switch Chassis\n - JF431A HP A12508 Switch Chassis\n - JF431B HP 12508 Switch Chassis\n - JF431C HP 12508 AC Switch Chassis\n - JC072B HP 12500 Main Processing Unit\n - JG497A HP 12500 MPU w/Comware V7 OS\n - JG782A HP FF 12508E AC Switch Chassis\n - JG783A HP FF 12508E DC Switch Chassis\n - JG784A HP FF 12518E AC Switch Chassis\n - JG785A HP FF 12518E DC Switch Chassis\n - JG802A HP FF 12500E MPU\n - JG803A HP FlexFabric 12500E TAA-compliant Main Processing Unit\n\n + **10500 (Comware 7) - Version: Fix in R7169P01**\n * HP Network Products\n - JC611A HP 10508-V Switch Chassis\n - JC612A HP 10508 Switch Chassis\n - JC613A HP 10504 Switch Chassis\n - JC748A HP 10512 Switch Chassis\n - JG820A HP 10504 TAA Switch Chassis\n - JG821A HP 10508 TAA Switch Chassis\n - JG822A HP 10508-V TAA Switch Chassis\n - JG823A HP 10512 TAA Switch Chassis\n - JG496A HP 10500 Type A MPU w/Comware v7 OS\n - JH198A HP 10500 Type D Main Processing Unit with Comware v7 Operating\nSystem\n - JH206A HP 10500 Type D TAA w/Comware v7 OS MPU\n\n + **12900 (Comware 7) - Version: Fix in R1137**\n * HP Network Products\n - JG619A HP FlexFabric 12910 Switch AC Chassis\n - JG621A HP FlexFabric 12910 Main Processing Unit\n - JG632A HP FlexFabric 12916 Switch AC Chassis\n - JG634A HP FlexFabric 12916 Main Processing Unit\n - JH104A HP FlexFabric 12900E Main Processing Unit\n - JH114A HP FlexFabric 12910 TAA-compliant Main Processing Unit\n - JH263A HP FlexFabric 12904E Main Processing Unit\n - JH255A HP FlexFabric 12908E Switch Chassis\n - JH262A HP FlexFabric 12904E Switch Chassis\n - JH113A HP FlexFabric 12910 TAA-compliant Switch AC Chassis\n - JH103A HP FlexFabric 12916E Switch Chassis\n\n + **5900 (Comware 7) - Version: Fix in R2422P01**\n * HP Network Products\n - JC772A HP 5900AF-48XG-4QSFP+ Switch\n - JG336A HP 5900AF-48XGT-4QSFP+ Switch\n - JG510A HP 5900AF-48G-4XG-2QSFP+ Switch\n - JG554A HP 5900AF-48XG-4QSFP+ TAA Switch\n - JG838A HP FF 5900CP-48XG-4QSFP+ Switch\n - JH036A HP FlexFabric 5900CP 48XG 4QSFP+ TAA-Compliant\n - JH037A HP 5900AF 48XGT 4QSFP+ TAA-Compliant Switch\n - JH038A HP 5900AF 48G 4XG 2QSFP+ TAA-Compliant\n - JG296A HP 5920AF-24XG Switch\n - JG555A HP 5920AF-24XG TAA Switch\n\n + **MSR1000 (Comware 7) - Version: Fix in R0106P33**\n * HP Network Products\n - JG875A HP MSR1002-4 AC Router\n - JH060A HP MSR1003-8S AC Router\n\n + **MSR2000 (Comware 7) - Version: Fix in R0106P33**\n * HP Network Products\n - JG411A HP MSR2003 AC Router\n - JG734A HP MSR2004-24 AC Router\n - JG735A HP MSR2004-48 Router\n - JG866A HP MSR2003 TAA-compliant AC Router\n\n + **MSR3000 (Comware 7) - Version: Fix in R0106P33**\n * HP Network Products\n - JG404A HP MSR3064 Router\n - JG405A HP MSR3044 Router\n - JG406A HP MSR3024 AC Router\n - JG407A HP MSR3024 DC Router\n - JG408A HP MSR3024 PoE Router\n - JG409A HP MSR3012 AC Router\n - JG410A HP MSR3012 DC Router\n - JG861A HP MSR3024 TAA-compliant AC Router\n\n + **MSR4000 (Comware 7) - Version: Fix in R0106P33**\n * HP Network Products\n - JG402A HP MSR4080 Router Chassis\n - JG403A HP MSR4060 Router Chassis\n - JG412A HP MSR4000 MPU-100 Main Processing Unit\n - JG869A HP MSR4000 TAA-compliant MPU-100 Main Processing Unit\n\n + **5800 (Comware 7) - Version: Fix in R7006P15**\n * HP Network Products\n - JC099A HP 5800-24G-PoE Switch\n - JC099B HP 5800-24G-PoE+ Switch\n - JC100A HP 5800-24G Switch\n - JC100B HP 5800-24G Switch\n - JC101A HP 5800-48G Switch with 2 Slots\n - JC101B HP 5800-48G-PoE+ Switch with 2 Interface Slots\n - JC103A HP 5800-24G-SFP Switch\n - JC103B HP 5800-24G-SFP Switch with 1 Interface Slot\n - JC104A HP 5800-48G-PoE Switch\n - JC104B HP 5800-48G-PoE+ Switch with 1 Interface Slot\n - JC105A HP 5800-48G Switch\n - JC105B HP 5800-48G Switch with 1 Interface Slot\n - JG254A HP 5800-24G-PoE+ TAA-compliant Switch\n - JG254B HP 5800-24G-PoE+ TAA-compliant Switch\n - JG255A HP 5800-24G TAA-compliant Switch\n - JG255B HP 5800-24G TAA-compliant Switch\n - JG256A HP 5800-24G-SFP TAA-compliant Switch with 1 Interface\n - JG256B HP 5800-24G-SFP TAA-compliant Switch with 1 Interface\n - JG257A HP 5800-48G-PoE+ TAA-compliant Switch with 1 Interface\n - JG257B HP 5800-48G-PoE+ TAA-compliant Switch with 1 Interface\n - JG258A HP 5800-48G TAA-compliant Switch with 1 Interface Slot\n - JG258B HP 5800-48G TAA-compliant Switch with 1 Interface Slot\n - JG225A HP 5800AF-48G Switch\n - JG225B HP 5800AF-48G Switch\n - JG242A HP 5800-48G-PoE+ TAA-compliant Switch with 2 Interface\n - JG242B HP 5800-48G-PoE+ TAA-compliant Switch with 2 Interface\n - JG243A HP 5820-24XG-SFP+ TAA-compliant Switch\n - JG243B HP 5820-24XG-SFP+ TAA-compliant Switch\n - JG259A HP 5820X-14XG-SFP+ TAA-compliant Switch with 2 Interface Slots\n\u0026 1 OAA Slot\n - JG259B HP 5820-14XG-SFP+ TAA-compliant Switch with 2 Interface Slots\nand 1 OAA Slot\n - JC106A HP 5820-14XG-SFP+ Switch with 2 Slots\n - JC106B HP 5820-14XG-SFP+ Switch with 2 Interface Slots \u0026 1 OAA Slot\n - JG219A HP 5820AF-24XG Switch\n - JG219B HP 5820AF-24XG Switch\n - JC102A HP 5820-24XG-SFP+ Switch\n - JC102B HP 5820-24XG-SFP+ Switch\n\n + **VSR (Comware 7) - Version: Fix in E0321**\n * HP Network Products\n - JG810AAE HP VSR1001 Virtual Services Router 60 Day Evaluation\nSoftware\n - JG811AAE HP VSR1001 Comware 7 Virtual Services Router\n - JG812AAE HP VSR1004 Comware 7 Virtual Services Router\n - JG813AAE HP VSR1008 Comware 7 Virtual Services Router\n\n + **7900 (Comware 7) - Version: Fix in R2137**\n * HP Network Products\n - JG682A HP FlexFabric 7904 Switch Chassis\n - JG841A HP FlexFabric 7910 Switch Chassis\n - JG842A HP FlexFabric 7910 7.2Tbps Fabric / Main Processing Unit\n - JH001A HP FlexFabric 7910 2.4Tbps Fabric / Main Processing Unit\n - JH122A HP FlexFabric 7904 TAA-compliant Switch Chassis\n - JH123A HP FlexFabric 7910 TAA-compliant Switch Chassis\n - JH124A HP FlexFabric 7910 7.2Tbps TAA-compliant Fabric/Main\nProcessing Unit\n - JH125A HP FlexFabric 7910 2.4Tbps TAA-compliant Fabric/Main\nProcessing Unit\n\n + **5130 (Comware 7) - Version: Fix in R3109P05**\n * HP Network Products\n - JG932A HP 5130-24G-4SFP+ EI Switch\n - JG933A HP 5130-24G-SFP-4SFP+ EI Switch\n - JG934A HP 5130-48G-4SFP+ EI Switch\n - JG936A HP 5130-24G-PoE+-4SFP+ (370W) EI Switch\n - JG937A HP 5130-48G-PoE+-4SFP+ (370W) EI Switch\n - JG975A HP 5130-24G-4SFP+ EI Brazil Switch\n - JG976A HP 5130-48G-4SFP+ EI Brazil Switch\n - JG977A HP 5130-24G-PoE+-4SFP+ (370W) EI Brazil Switch\n - JG978A HP 5130-48G-PoE+-4SFP+ (370W) EI Brazil Switch\n - JG938A HP 5130-24G-2SFP+-2XGT EI Switch\n - JG939A HP 5130-48G-2SFP+-2XGT EI Switch\n - JG940A HP 5130-24G-PoE+-2SFP+-2XGT (370W) EI Switch\n - JG941A HP 5130-48G-PoE+-2SFP+-2XGT (370W) EI Switch\n\n + **5700 (Comware 7) - Version: Fix in R2422P01**\n * HP Network Products\n - JG894A HP FlexFabric 5700-48G-4XG-2QSFP+ Switch\n - JG895A HP FlexFabric 5700-48G-4XG-2QSFP+ TAA-compliant Switch\n - JG896A HP FlexFabric 5700-40XG-2QSFP+ Switch\n - JG897A HP FlexFabric 5700-40XG-2QSFP+ TAA-compliant Switch\n - JG898A HP FlexFabric 5700-32XGT-8XG-2QSFP+ Switch\n - JG899A HP FlexFabric 5700-32XGT-8XG-2QSFP+ TAA-compliant Switch\n\n + **5930 (Comware 7) - Version: Fix in R2422P01**\n * HP Network Products\n - JG726A HP FlexFabric 5930 32QSFP+ Switch\n - JG727A HP FlexFabric 5930 32QSFP+ TAA-compliant Switch\n - JH178A HP FlexFabric 5930 2QSFP+ 2-slot Switch\n - JH179A HP FlexFabric 5930 4-slot Switch\n - JH187A HP FlexFabric 5930 2QSFP+ 2-slot TAA-compliant Switch\n - JH188A HP FlexFabric 5930 4-slot TAA-compliant Switch\n\nHISTORY\nVersion:1 (rev.1) - 8 March 2016 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running Hewlett Packard Enterprise (HPE) software\nproducts should be applied in accordance with the customer\u0027s patch management\npolicy. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1798\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1799\n http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Business Server 1/X86_64:\n b0f98e6b8700e3e3413582fe28d1ba06 mbs1/x86_64/ntp-4.2.6p5-8.4.mbs1.x86_64.rpm\n d864780718c95368bf9ec81643e35e5d mbs1/x86_64/ntp-client-4.2.6p5-8.4.mbs1.x86_64.rpm\n 6f457df52d46fb8e6b0fe44aead752eb mbs1/x86_64/ntp-doc-4.2.6p5-8.4.mbs1.x86_64.rpm \n b4bff3de733ea6d2839a77a9211ce02b mbs1/SRPMS/ntp-4.2.6p5-8.4.mbs1.src.rpm\n\n Mandriva Business Server 2/X86_64:\n e9ac2f3465bcc50199aef8a4d553927f mbs2/x86_64/ntp-4.2.6p5-16.3.mbs2.x86_64.rpm\n cf2970c3c56efbfa84f964532ad64544 mbs2/x86_64/ntp-client-4.2.6p5-16.3.mbs2.x86_64.rpm\n 1ae1b1d3c2e7bdea25c01c33652b6169 mbs2/x86_64/ntp-doc-4.2.6p5-16.3.mbs2.noarch.rpm \n d250433009fd187361bda6338dc5eede mbs2/SRPMS/ntp-4.2.6p5-16.3.mbs2.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. ============================================================================\nUbuntu Security Notice USN-2567-1\nApril 13, 2015\n\nntp vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 14.10\n- Ubuntu 14.04 LTS\n- Ubuntu 12.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in NTP. This issue could either cause ntp-keygen to hang, or\ncould result in non-random keys. (CVE number pending)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 14.10:\n ntp 1:4.2.6.p5+dfsg-3ubuntu2.14.10.3\n\nUbuntu 14.04 LTS:\n ntp 1:4.2.6.p5+dfsg-3ubuntu2.14.04.3\n\nUbuntu 12.04 LTS:\n ntp 1:4.2.6.p3+dfsg-1ubuntu3.4\n\nIn general, a standard system update will make all the necessary changes. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: ntp security, bug fix, and enhancement update\nAdvisory ID: RHSA-2015:2231-04\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2015-2231.html\nIssue date: 2015-11-19\nCVE Names: CVE-2014-9297 CVE-2014-9298 CVE-2014-9750 \n CVE-2014-9751 CVE-2015-1798 CVE-2015-1799 \n CVE-2015-3405 \n=====================================================================\n\n1. Summary:\n\nUpdated ntp packages that fix multiple security issues, several bugs, and\nadd various enhancements are now available for Red Hat Enterprise Linux 7. \n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64\nRed Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 7) - aarch64, noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64\n\n3. Description:\n\nThe Network Time Protocol (NTP) is used to synchronize a computer\u0027s time\nwith another referenced time source. These packages include the ntpd\nservice which continuously adjusts system time and utilities used to query\nand configure the ntpd service. \n\nIt was found that because NTP\u0027s access control was based on a source IP\naddress, an attacker could bypass source IP restrictions and send\nmalicious control and configuration packets by spoofing ::1 addresses. \n(CVE-2014-9298, CVE-2014-9751)\n\nA denial of service flaw was found in the way NTP hosts that were peering\nwith each other authenticated themselves before updating their internal\nstate variables. An attacker could send packets to one peer host, which\ncould cascade to other peers, and stop the synchronization process among\nthe reached peers. (CVE-2015-1799)\n\nA flaw was found in the way the ntp-keygen utility generated MD5 symmetric\nkeys on big-endian systems. An attacker could possibly use this flaw to\nguess generated MD5 keys, which could then be used to spoof an NTP client\nor server. (CVE-2015-3405)\n\nA stack-based buffer overflow was found in the way the NTP autokey protocol\nwas implemented. When an NTP client decrypted a secret received from an NTP\nserver, it could cause that client to crash. (CVE-2014-9297, CVE-2014-9750)\n\nIt was found that ntpd did not check whether a Message Authentication Code\n(MAC) was present in a received packet when ntpd was configured to use\nsymmetric cryptographic keys. A man-in-the-middle attacker could use this\nflaw to send crafted packets that would be accepted by a client or a peer\nwithout the attacker knowing the symmetric key. (CVE-2015-1798)\n\nThe CVE-2015-1798 and CVE-2015-1799 issues were discovered by Miroslav\nLichv\u00e1r of Red Hat. \n\nBug fixes:\n\n* The ntpd service truncated symmetric keys specified in the key file to 20\nbytes. As a consequence, it was impossible to configure NTP authentication\nto work with peers that use longer keys. With this update, the maximum key\nlength has been changed to 32 bytes. (BZ#1191111)\n\n* The ntpd service could previously join multicast groups only when\nstarting, which caused problems if ntpd was started during system boot\nbefore network was configured. With this update, ntpd attempts to join\nmulticast groups every time network configuration is changed. (BZ#1207014)\n\n* Previously, the ntp-keygen utility used the exponent of 3 when generating\nRSA keys. Consequently, generating RSA keys failed when FIPS mode was\nenabled. With this update, ntp-keygen has been modified to use the exponent\nof 65537, and generating keys in FIPS mode now works as expected. \n(BZ#1191116)\n\n* The ntpd service dropped incoming NTP packets if their source port was\nlower than 123 (the NTP port). With this update, ntpd no longer checks the\nsource port number, and clients behind NAT are now able to correctly\nsynchronize with the server. (BZ#1171640)\n\nEnhancements:\n\n* This update adds support for configurable Differentiated Services Code\nPoints (DSCP) in NTP packets, simplifying configuration in large networks\nwhere different NTP implementations or versions are using different DSCP\nvalues. (BZ#1202828)\n\n* This update adds the ability to configure separate clock stepping\nthresholds for each direction (backward and forward). Use the \"stepback\"\nand \"stepfwd\" options to configure each threshold. (BZ#1193154)\n\n* Support for nanosecond resolution has been added to the Structural\nHealth Monitoring (SHM) reference clock. Prior to this update, when a\nPrecision Time Protocol (PTP) hardware clock was used as a time source to\nsynchronize the system clock, the accuracy of the synchronization was\nlimited due to the microsecond resolution of the SHM protocol. The\nnanosecond extension in the SHM protocol now allows sub-microsecond\nsynchronization of the system clock. (BZ#1117702)\n\nAll ntp users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues and add these\nenhancements. \n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1117702 - SHM refclock doesn\u0027t support nanosecond resolution\n1122012 - SHM refclock allows only two units with owner-only access\n1171640 - NTP drops requests when sourceport is below 123\n1180721 - ntp: mreadvar command crash in ntpq\n1184572 - CVE-2014-9298 CVE-2014-9751 ntp: drop packets with source address ::1\n1184573 - CVE-2014-9297 CVE-2014-9750 ntp: vallen in extension fields are not validated\n1191108 - ntpd should warn when monitoring facility can\u0027t be disabled due to restrict configuration\n1191122 - ntpd -x steps clock on leap second\n1193154 - permit differential fwd/back threshold for step vs. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nntp-4.2.6p5-22.el7.src.rpm\n\nx86_64:\nntp-4.2.6p5-22.el7.x86_64.rpm\nntp-debuginfo-4.2.6p5-22.el7.x86_64.rpm\nntpdate-4.2.6p5-22.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Client Optional (v. 7):\n\nnoarch:\nntp-doc-4.2.6p5-22.el7.noarch.rpm\nntp-perl-4.2.6p5-22.el7.noarch.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-22.el7.x86_64.rpm\nsntp-4.2.6p5-22.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nntp-4.2.6p5-22.el7.src.rpm\n\nx86_64:\nntp-4.2.6p5-22.el7.x86_64.rpm\nntp-debuginfo-4.2.6p5-22.el7.x86_64.rpm\nntpdate-4.2.6p5-22.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional (v. 7):\n\nnoarch:\nntp-doc-4.2.6p5-22.el7.noarch.rpm\nntp-perl-4.2.6p5-22.el7.noarch.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-22.el7.x86_64.rpm\nsntp-4.2.6p5-22.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nntp-4.2.6p5-22.el7.src.rpm\n\naarch64:\nntp-4.2.6p5-22.el7.aarch64.rpm\nntp-debuginfo-4.2.6p5-22.el7.aarch64.rpm\nntpdate-4.2.6p5-22.el7.aarch64.rpm\n\nppc64:\nntp-4.2.6p5-22.el7.ppc64.rpm\nntp-debuginfo-4.2.6p5-22.el7.ppc64.rpm\nntpdate-4.2.6p5-22.el7.ppc64.rpm\n\nppc64le:\nntp-4.2.6p5-22.el7.ppc64le.rpm\nntp-debuginfo-4.2.6p5-22.el7.ppc64le.rpm\nntpdate-4.2.6p5-22.el7.ppc64le.rpm\n\ns390x:\nntp-4.2.6p5-22.el7.s390x.rpm\nntp-debuginfo-4.2.6p5-22.el7.s390x.rpm\nntpdate-4.2.6p5-22.el7.s390x.rpm\n\nx86_64:\nntp-4.2.6p5-22.el7.x86_64.rpm\nntp-debuginfo-4.2.6p5-22.el7.x86_64.rpm\nntpdate-4.2.6p5-22.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 7):\n\naarch64:\nntp-debuginfo-4.2.6p5-22.el7.aarch64.rpm\nsntp-4.2.6p5-22.el7.aarch64.rpm\n\nnoarch:\nntp-doc-4.2.6p5-22.el7.noarch.rpm\nntp-perl-4.2.6p5-22.el7.noarch.rpm\n\nppc64:\nntp-debuginfo-4.2.6p5-22.el7.ppc64.rpm\nsntp-4.2.6p5-22.el7.ppc64.rpm\n\nppc64le:\nntp-debuginfo-4.2.6p5-22.el7.ppc64le.rpm\nsntp-4.2.6p5-22.el7.ppc64le.rpm\n\ns390x:\nntp-debuginfo-4.2.6p5-22.el7.s390x.rpm\nsntp-4.2.6p5-22.el7.s390x.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-22.el7.x86_64.rpm\nsntp-4.2.6p5-22.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nntp-4.2.6p5-22.el7.src.rpm\n\nx86_64:\nntp-4.2.6p5-22.el7.x86_64.rpm\nntp-debuginfo-4.2.6p5-22.el7.x86_64.rpm\nntpdate-4.2.6p5-22.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 7):\n\nnoarch:\nntp-doc-4.2.6p5-22.el7.noarch.rpm\nntp-perl-4.2.6p5-22.el7.noarch.rpm\n\nx86_64:\nntp-debuginfo-4.2.6p5-22.el7.x86_64.rpm\nsntp-4.2.6p5-22.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2014-9297\nhttps://access.redhat.com/security/cve/CVE-2014-9298\nhttps://access.redhat.com/security/cve/CVE-2014-9750\nhttps://access.redhat.com/security/cve/CVE-2014-9751\nhttps://access.redhat.com/security/cve/CVE-2015-1798\nhttps://access.redhat.com/security/cve/CVE-2015-1799\nhttps://access.redhat.com/security/cve/CVE-2015-3405\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2015 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD4DBQFWTkFJXlSAg2UNWIIRAphzAKCRHDVdHI5OvJ8glkXYLBwyQgeyvwCYmTV3\n1hLTu5I/PUzWOnD8rRIlZQ==\n=sWdG\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce. This could allow a remote\n attacker to cause a denial of service by impeding synchronization\n between NTP peers. \n\nAdditionally, it was discovered that generating MD5 keys using ntp-keygen\non big endian machines would either trigger an endless loop, or generate\nnon-random keys. \n\nFor the stable distribution (wheezy), these problems have been fixed in\nversion 1:4.2.6.p5+dfsg-2+deb7u4. \n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 1:4.2.6.p5+dfsg-7. \n\nWe recommend that you upgrade your ntp packages. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-2015-06-30-2 OS X Yosemite v10.10.4 and Security Update\n2015-005\n\nOS X Yosemite v10.10.4 and Security Update 2015-005 are now available\nand address the following:\n\nAdmin Framework\nAvailable for: OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.3\nImpact: A process may gain admin privileges without proper\nauthentication\nDescription: An issue existed when checking XPC entitlements. This\nissue was addressed through improved entitlement checking. \nCVE-ID\nCVE-2015-3671 : Emil Kvarnhammar at TrueSec\n\nAdmin Framework\nAvailable for: OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.3\nImpact: A non-admin user may obtain admin rights\nDescription: An issue existed in the handling of user\nauthentication. This issue was addressed through improved error\nchecking. \nCVE-ID\nCVE-2015-3672 : Emil Kvarnhammar at TrueSec\n\nAdmin Framework\nAvailable for: OS X Yosemite v10.10 to v10.10.3\nImpact: An attacker may abuse Directory Utility to gain root\nprivileges\nDescription: Directory Utility was able to be moved and modified to\nachieve code execution within an entitled process. This issue was\naddressed by limiting the disk location that writeconfig clients may\nbe executed from. \nCVE-ID\nCVE-2015-3673 : Patrick Wardle of Synack, Emil Kvarnhammar at TrueSec\n\nafpserver\nAvailable for: OS X Yosemite v10.10 to v10.10.3\nImpact: A remote attacker may be able to cause unexpected\napplication termination or arbitrary code execution\nDescription: A memory corruption issue existed in the AFP server. \nThis issue was addressed through improved memory handling. \nCVE-ID\nCVE-2015-3674 : Dean Jerkovich of NCC Group\n\napache\nAvailable for: OS X Yosemite v10.10 to v10.10.3\nImpact: An attacker may be able to access directories that are\nprotected with HTTP authentication without knowing the correct\ncredentials\nDescription: The default Apache configuration did not include\nmod_hfs_apple. If Apache was manually enabled and the configuration\nwas not changed, some files that should not be accessible might have\nbeen accessible using a specially crafted URL. This issue was\naddressed by enabling mod_hfs_apple. \nCVE-ID\nCVE-2015-3675 : Apple\n\napache\nAvailable for: OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.3\nImpact: Multiple vulnerabilities exist in PHP, the most serious of\nwhich may lead to arbitrary code execution\nDescription: Multiple vulnerabilities existed in PHP versions prior\nto 5.5.24 and 5.4.40. These were addressed by updating PHP to\nversions 5.5.24 and 5.4.40. \nCVE-ID\nCVE-2015-0235\nCVE-2015-0273\n\nAppleGraphicsControl\nAvailable for: OS X Yosemite v10.10 to v10.10.3\nImpact: A malicious application may be able to determine kernel\nmemory layout\nDescription: An issue existed in AppleGraphicsControl which could\nhave led to the disclosure of kernel memory layout. This issue was\naddressed through improved bounds checking. \nCVE-ID\nCVE-2015-3676 : Chen Liang of KEEN Team\n\nAppleFSCompression\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.3\nImpact: A malicious application may be able to determine kernel\nmemory layout\nDescription: An issue existed in LZVN compression that could have\nled to the disclosure of kernel memory content. This issue was\naddressed through improved memory handling. \nCVE-ID\nCVE-2015-3677 : an anonymous researcher working with HP\u0027s Zero Day\nInitiative\n\nAppleThunderboltEDMService\nAvailable for: OS X Yosemite v10.10 to v10.10.3\nImpact: A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription: A memory corruption issue existed in the handling of\ncertain Thunderbolt commands from local processes. This issue was\naddressed through improved memory handling. \nCVE-ID\nCVE-2015-3678 : Apple\n\nATS\nAvailable for: OS X Yosemite v10.10 to v10.10.3\nImpact: Processing a maliciously crafted font file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: Multiple memory corruption issues existed in handling\nof certain fonts. These issues were addressed through improved memory\nhandling. \nCVE-ID\nCVE-2015-3679 : Pawel Wylecial working with HP\u0027s Zero Day Initiative\nCVE-2015-3680 : Pawel Wylecial working with HP\u0027s Zero Day Initiative\nCVE-2015-3681 : John Villamil (@day6reak), Yahoo Pentest Team\nCVE-2015-3682 : Nuode Wei\n\nBluetooth\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.3\nImpact: A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription: A memory corruption issue existed in the Bluetooth HCI\ninterface. This issue was addressed through improved memory handling. \nCVE-ID\nCVE-2015-3683 : Roberto Paleari and Aristide Fattori of Emaze\nNetworks\n\nCertificate Trust Policy\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.3\nImpact: An attacker with a privileged network position may be able\nto intercept network traffic\nDescription: An intermediate certificate was incorrectly issued by\nthe certificate authority CNNIC. This issue was addressed through the\naddition of a mechanism to trust only a subset of certificates issued\nprior to the mis-issuance of the intermediate. Further details are\navailable at https://support.apple.com/en-us/HT204938\n\nCertificate Trust Policy\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.3\nDescription: The certificate trust policy was updated. The complete\nlist of certificates may be viewed at https://support.apple.com/en-\nus/HT202858. \n\nCFNetwork HTTPAuthentication\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.3\nImpact: Following a maliciously crafted URL may lead to arbitrary\ncode execution\nDescription: A memory corruption issue existed in handling of\ncertain URL credentials. This issue was addressed through improved\nmemory handling. \nCVE-ID\nCVE-2015-3684 : Apple\n\nCoreText\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.3\nImpact: Processing a maliciously crafted text file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: Multiple memory corruption issues existed in the\nprocessing of text files. These issues were addressed through\nimproved bounds checking. \nCVE-ID\nCVE-2015-1157\nCVE-2015-3685 : Apple\nCVE-2015-3686 : John Villamil (@day6reak), Yahoo Pentest Team\nCVE-2015-3687 : John Villamil (@day6reak), Yahoo Pentest Team\nCVE-2015-3688 : John Villamil (@day6reak), Yahoo Pentest Team\nCVE-2015-3689 : Apple\n\ncoreTLS\nAvailable for: OS X Yosemite v10.10 to v10.10.3\nImpact: An attacker with a privileged network position may intercept\nSSL/TLS connections\nDescription: coreTLS accepted short ephemeral Diffie-Hellman (DH)\nkeys, as used in export-strength ephemeral DH cipher suites. This\nissue, also known as Logjam, allowed an attacker with a privileged\nnetwork position to downgrade security to 512-bit DH if the server\nsupported an export-strength ephemeral DH cipher suite. The issue was\naddressed by increasing the default minimum size allowed for DH\nephemeral keys to 768 bits. \nCVE-ID\nCVE-2015-4000 : The weakdh team at weakdh.org, Hanno Boeck\n\nDiskImages\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.3\nImpact: A malicious application may be able to determine kernel\nmemory layout\nDescription: An information disclosure issue existed in the\nprocessing of disk images. This issue was addressed through improved\nmemory management. \nCVE-ID\nCVE-2015-3690 : Peter Rutenbar working with HP\u0027s Zero Day Initiative\n\nDisplay Drivers\nAvailable for: OS X Yosemite v10.10 to v10.10.3\nImpact: A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription: An issue existed in the Monitor Control Command Set\nkernel extension by which a userland process could control the value\nof a function pointer within the kernel. The issue was addressed by\nremoving the affected interface. \nCVE-ID\nCVE-2015-3691 : Roberto Paleari and Aristide Fattori of Emaze\nNetworks\n\nEFI\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.3\nImpact: A malicious application with root privileges may be able to\nmodify EFI flash memory\nDescription: An insufficient locking issue existed with EFI flash\nwhen resuming from sleep states. This issue was addressed through\nimproved locking. \nCVE-ID\nCVE-2015-3692 : Trammell Hudson of Two Sigma Investments, Xeno Kovah\nand Corey Kallenberg of LegbaCore LLC, Pedro Vilaca\n\nEFI\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.3\nImpact: A malicious application may induce memory corruption to\nescalate privileges\nDescription: A disturbance error, also known as Rowhammer, exists\nwith some DDR3 RAM that could have led to memory corruption. This\nissue was mitigated by increasing memory refresh rates. \nCVE-ID\nCVE-2015-3693 : Mark Seaborn and Thomas Dullien of Google, working\nfrom original research by Yoongu Kim et al (2014)\n\nFontParser\nAvailable for: OS X Yosemite v10.10 to v10.10.3\nImpact: Processing a maliciously crafted font file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A memory corruption issue existed in the processing of\nfont files. This issue was addressed through improved input\nvalidation. \nCVE-ID\nCVE-2015-3694 : John Villamil (@day6reak), Yahoo Pentest Team\n\nGraphics Driver\nAvailable for: OS X Yosemite v10.10 to v10.10.3\nImpact: A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription: An out of bounds write issue existed in NVIDIA graphics\ndriver. This issue was addressed through improved bounds checking. \nCVE-ID\nCVE-2015-3712 : Ian Beer of Google Project Zero\n\nIntel Graphics Driver\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.3\nImpact: Multiple buffer overflow issues exist in the Intel graphics\ndriver, the most serious of which may lead to arbitrary code\nexecution with system privileges\nDescription: Multiple buffer overflow issues existed in the Intel\ngraphics driver. These were addressed through additional bounds\nchecks. \nCVE-ID\nCVE-2015-3695 : Ian Beer of Google Project Zero\nCVE-2015-3696 : Ian Beer of Google Project Zero\nCVE-2015-3697 : Ian Beer of Google Project Zero\nCVE-2015-3698 : Ian Beer of Google Project Zero\nCVE-2015-3699 : Ian Beer of Google Project Zero\nCVE-2015-3700 : Ian Beer of Google Project Zero\nCVE-2015-3701 : Ian Beer of Google Project Zero\nCVE-2015-3702 : KEEN Team\n\nImageIO\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.3\nImpact: Multiple vulnerabilities existed in libtiff, the most\nserious of which may lead to arbitrary code execution\nDescription: Multiple vulnerabilities existed in libtiff versions\nprior to 4.0.4. They were addressed by updating libtiff to version\n4.0.4. \nCVE-ID\nCVE-2014-8127\nCVE-2014-8128\nCVE-2014-8129\nCVE-2014-8130\n\nImageIO\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.3\nImpact: Processing a maliciously crafted .tiff file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A memory corruption issue existed in the processing of\n.tiff files. This issue was addressed through improved bounds\nchecking. \nCVE-ID\nCVE-2015-3703 : Apple\n\nInstall Framework Legacy\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.3\nImpact: A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription: Several issues existed in how Install.framework\u0027s\n\u0027runner\u0027 setuid binary dropped privileges. This was addressed by\nproperly dropping privileges. \nCVE-ID\nCVE-2015-3704 : Ian Beer of Google Project Zero\n\nIOAcceleratorFamily\nAvailable for: OS X Yosemite v10.10 to v10.10.3\nImpact: A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription: Multiple memory corruption issues existed in\nIOAcceleratorFamily. These issues were addressed through improved\nmemory handling. \nCVE-ID\nCVE-2015-3705 : KEEN Team\nCVE-2015-3706 : KEEN Team\n\nIOFireWireFamily\nAvailable for: OS X Yosemite v10.10 to v10.10.3\nImpact: A malicious application may be able to execute arbitrary\ncode with system privileges\nDescription: Multiple null pointer dereference issues existed in the\nFireWire driver. These issues were addressed through improved error\nchecking. \nCVE-ID\nCVE-2015-3707 : Roberto Paleari and Aristide Fattori of Emaze\nNetworks\n\nKernel\nAvailable for: OS X Yosemite v10.10 to v10.10.3\nImpact: A malicious application may be able to determine kernel\nmemory layout\nDescription: A memory management issue existed in the handling of\nAPIs related to kernel extensions which could have led to the\ndisclosure of kernel memory layout. This issue was addressed through\nimproved memory management. \nCVE-ID\nCVE-2015-3720 : Stefan Esser\n\nKernel\nAvailable for: OS X Yosemite v10.10 to v10.10.3\nImpact: A malicious application may be able to determine kernel\nmemory layout\nDescription: A memory management issue existed in the handling of\nHFS parameters which could have led to the disclosure of kernel\nmemory layout. This issue was addressed through improved memory\nmanagement. \nCVE-ID\nCVE-2015-3721 : Ian Beer of Google Project Zero\n\nkext tools\nAvailable for: OS X Yosemite v10.10 to v10.10.3\nImpact: A malicious application may be able to overwrite arbitrary\nfiles\nDescription: kextd followed symbolic links while creating a new\nfile. This issue was addressed through improved handling of symbolic\nlinks. \nCVE-ID\nCVE-2015-3708 : Ian Beer of Google Project Zero\n\nkext tools\nAvailable for: OS X Yosemite v10.10 to v10.10.3\nImpact: A local user may be able to load unsigned kernel extensions\nDescription: A time-of-check time-of-use (TOCTOU) race condition\ncondition existed while validating the paths of kernel extensions. \nThis issue was addressed through improved checks to validate the path\nof the kernel extensions. \nCVE-ID\nCVE-2015-3709 : Ian Beer of Google Project Zero\n\nMail\nAvailable for: OS X Yosemite v10.10 to v10.10.3\nImpact: A maliciously crafted email can replace the message content\nwith an arbitrary webpage when the message is viewed\nDescription: An issue existed in the support for HTML email which\nallowed message content to be refreshed with an arbitrary webpage. \nThe issue was addressed through restricted support for HTML content. \nCVE-ID\nCVE-2015-3710 : Aaron Sigel of vtty.com, Jan Soucek\n\nntfs\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.3\nImpact: A malicious application may be able to determine kernel\nmemory layout\nDescription: An issue existed in NTFS that could have led to the\ndisclosure of kernel memory content. This issue was addressed through\nimproved memory handling. \nCVE-ID\nCVE-2015-3711 : Peter Rutenbar working with HP\u0027s Zero Day Initiative\n\nntp\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.3\nImpact: An attacker in a privileged position may be able to perform\na denial of service attack against two ntp clients\nDescription: Multiple issues existed in the authentication of ntp\npackets being received by configured end-points. These issues were\naddressed through improved connection state management. \nCVE-ID\nCVE-2015-1798\nCVE-2015-1799\n\nOpenSSL\nAvailable for: OS X Yosemite v10.10 to v10.10.3\nImpact: Multiple issues exist in OpenSSL, including one that may\nallow an attacker to intercept connections to a server that supports\nexport-grade ciphers\nDescription: Multiple issues existed in OpenSSL 0.9.8zd which were\naddressed by updating OpenSSL to version 0.9.8zf. \nCVE-ID\nCVE-2015-0209\nCVE-2015-0286\nCVE-2015-0287\nCVE-2015-0288\nCVE-2015-0289\nCVE-2015-0293\n\nQuickTime\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.3\nImpact: Processing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: Multiple memory corruption issues existed in QuickTime. \nThese issues were addressed through improved memory handling. \nCVE-ID\nCVE-2015-3661 : G. Geshev working with HP\u0027s Zero Day Initiative\nCVE-2015-3662 : kdot working with HP\u0027s Zero Day Initiative\nCVE-2015-3663 : kdot working with HP\u0027s Zero Day Initiative\nCVE-2015-3666 : Steven Seeley of Source Incite working with HP\u0027s Zero\nDay Initiative\nCVE-2015-3667 : Ryan Pentney, Richard Johnson of Cisco Talos and Kai\nLu of Fortinet\u0027s FortiGuard Labs, Ryan Pentney, and Richard Johnson\nof Cisco Talos and Kai Lu of Fortinet\u0027s FortiGuard Labs\nCVE-2015-3668 : Kai Lu of Fortinet\u0027s FortiGuard Labs\nCVE-2015-3713 : Apple\n\nSecurity\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.3\nImpact: A remote attacker may cause an unexpected application\ntermination or arbitrary code execution\nDescription: An integer overflow existed in the Security framework\ncode for parsing S/MIME e-mail and some other signed or encrypted\nobjects. This issue was addressed through improved validity checking. \nCVE-ID\nCVE-2013-1741\n\nSecurity\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.3\nImpact: Tampered applications may not be prevented from launching\nDescription: Apps using custom resource rules may have been\nsusceptible to tampering that would not have invalidated the\nsignature. This issue was addressed with improved resource\nvalidation. \nCVE-ID\nCVE-2015-3714 : Joshua Pitts of Leviathan Security Group\n\nSecurity\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.3\nImpact: A malicious application may be able to bypass code signing\nchecks\nDescription: An issue existed where code signing did not verify\nlibraries loaded outside the application bundle. This issue was\naddressed with improved bundle verification. \nCVE-ID\nCVE-2015-3715 : Patrick Wardle of Synack\n\nSpotlight\nAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,\nOS X Yosemite v10.10 to v10.10.3\nImpact: Searching for a malicious file with Spotlight may lead to\ncommand injection\nDescription: A command injection vulnerability existed in the\nhandling of filenames of photos added to the local photo library. \nThis issue was addressed through improved input validation. \nCVE-ID\nCVE-2015-3716 : Apple\n\nSQLite\nAvailable for: OS X Yosemite v10.10 to v10.10.3\nImpact: A remote attacker may cause an unexpected application\ntermination or arbitrary code execution\nDescription: Multiple buffer overflows existed in SQLite\u0027s printf\nimplementation. These issues were addressed through improved bounds\nchecking. \nCVE-ID\nCVE-2015-3717 : Peter Rutenbar working with HP\u0027s Zero Day Initiative\n\nSystem Stats\nAvailable for: OS X Yosemite v10.10 to v10.10.3\nImpact: A malicious app may be able to compromise systemstatsd\nDescription: A type confusion issue existed in systemstatsd\u0027s\nhandling of interprocess communication. By sending a maliciously\nformatted message to systemstatsd, it may have been possible to\nexecute arbitrary code as the systemstatsd process. The issue was\naddressed through additional type checking. \nCVE-ID\nCVE-2015-3718 : Roberto Paleari and Aristide Fattori of Emaze\nNetworks\n\nTrueTypeScaler\nAvailable for: OS X Yosemite v10.10 to v10.10.3\nImpact: Processing a maliciously crafted font file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A memory corruption issue existed in the processing of\nfont files. This issue was addressed through improved input\nvalidation. \nCVE-ID\nCVE-2015-3719 : John Villamil (@day6reak), Yahoo Pentest Team\n\nzip\nAvailable for: OS X Yosemite v10.10 to v10.10.3\nImpact: Extracting a maliciously crafted zip file using the unzip\ntool may lead to an unexpected application termination or arbitrary\ncode execution\nDescription: Multiple memory corruption issues existed in the\nhandling of zip files. These issues were addressed through improved\nmemory handling. \nCVE-ID\n\nCVE-2014-8139\nCVE-2014-8140\nCVE-2014-8141\n\n\nOS X Yosemite 10.10.4 includes the security content of Safari 8.0.7. \nhttps://support.apple.com/en-us/HT204950\n\nOS X Yosemite 10.10.4 and Security Update 2015-005 may be obtained\nfrom the Mac App Store or Apple\u0027s Software Downloads web site:\nhttp://www.apple.com/support/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: http://support.apple.com/kb/HT1222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG/MacGPG2 v2\nComment: GPGTools - http://gpgtools.org\n\niQIcBAEBCAAGBQJVksFmAAoJEBcWfLTuOo7tV1AQAIYpkOMpHp181b+70sgyZ/Ue\nmFM527FFGDfLLuIW6LTcBsEFe9cfZxumB8eOFPirTNRK7krsVMo1W+faHXyWOnx7\nkbWylHdhaoxnX+A6Gj0vP71V6TNNsTi9+2dmdmHUnwxZ7Ws5QCNKebumUG3MMXXo\nEKxE5SNSNKyMSSYmliS26cdl8fWrmg9qTxiZQnxjOCrg/CNAolgVIRRfdMUL7i4w\naGAyrlJXOxFOuNkqdHX2luccuHFV7aW/dIXQ4MyjiRNl/bWrBQmQlneLLpPdFZlH\ncMfGa2/baaNaCbU/GqhNKbO4fKYVaqQWzfUrtqX0+bRv2wmOq33ARy9KE23bYTvL\nU4E9x9z87LsLXGAdjUi6MDe5g87DcmwIEigfF6/EHbDYa/2VvSdIa74XRv/JCN1+\naftHLotin76h4qV/dCAPf5J/Fr/1KFCM0IphhG7p+7fVTfyy7YDXNBiKCEZzLf8U\nTUWLUCgQhobtakqwzQJ5qyF8u63xzVXj8oeTOw6iiY/BLlj9def5LMm/z6ZKGTyC\n3c4+Sy5XvBHZoeiwdcndTVpnFbmmjZRdeqtdW/zX5mHnxXPa3lZiGoBDhHQgIg6J\n1tTVtnO1JSLXVYDR6Evx1EH10Vgkt2wAGTLjljSLwtckoEqc78qMAT1G5U4nFffI\n+gGm5FbAxjxElgA/gbaq\n=KLda\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2015-1799" }, { "db": "CERT/CC", "id": "VU#374268" }, { "db": "JVNDB", "id": "JVNDB-2015-002116" }, { "db": "BID", "id": "73950" }, { "db": "VULMON", "id": "CVE-2015-1799" }, { "db": "PACKETSTORM", "id": "131582" }, { "db": "PACKETSTORM", "id": "131941" }, { "db": "PACKETSTORM", "id": "136119" }, { "db": "PACKETSTORM", "id": "131385" }, { "db": "PACKETSTORM", "id": "131405" }, { "db": "PACKETSTORM", "id": "134448" }, { "db": "PACKETSTORM", "id": "131396" }, { "db": "PACKETSTORM", "id": "132518" } ], "trust": 3.42 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#374268", "trust": 3.0 }, { "db": "NVD", "id": "CVE-2015-1799", "trust": 3.0 }, { "db": "BID", "id": "73950", "trust": 1.4 }, { "db": "SECTRACK", "id": "1032031", "trust": 1.1 }, { "db": "MCAFEE", "id": "SB10114", "trust": 1.1 }, { "db": "JVN", "id": "JVNVU95993136", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-002116", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-17-094-04", "trust": 0.4 }, { "db": "VULMON", "id": "CVE-2015-1799", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "131582", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "131941", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "136119", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "131385", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "131405", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "134448", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "131396", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "132518", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#374268" }, { "db": "VULMON", "id": "CVE-2015-1799" }, { "db": "BID", "id": "73950" }, { "db": "JVNDB", "id": "JVNDB-2015-002116" }, { "db": "PACKETSTORM", "id": "131582" }, { "db": "PACKETSTORM", "id": "131941" }, { "db": "PACKETSTORM", "id": "136119" }, { "db": "PACKETSTORM", "id": "131385" }, { "db": "PACKETSTORM", "id": "131405" }, { "db": "PACKETSTORM", "id": "134448" }, { "db": "PACKETSTORM", "id": "131396" }, { "db": "PACKETSTORM", "id": "132518" }, { "db": "NVD", "id": "CVE-2015-1799" } ] }, "id": "VAR-201504-0362", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.478814715 }, "last_update_date": "2024-07-23T20:18:07.348000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "APPLE-SA-2015-06-30-2 OS X Yosemite v10.10.4 and Security Update 2015-005", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2015/jun/msg00002.html" }, { "title": "HT204942", "trust": 0.8, "url": "https://support.apple.com/en-us/ht204942" }, { "title": "HT204942", "trust": 0.8, "url": "https://support.apple.com/ja-jp/ht204942" }, { "title": "cisco-sa-20150408-ntpd", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150408-ntpd" }, { "title": "Bug 2781", "trust": 0.8, "url": "http://bugs.ntp.org/show_bug.cgi?id=2781" }, { "title": "Oracle Solaris Third Party Bulletin - April 2015", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "title": "Recent Vulnerabilities", "trust": 0.8, "url": "http://support.ntp.org/bin/view/main/securitynotice#recent_vulnerabilities" }, { "title": "38275", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=38275" }, { "title": "cisco-sa-20150408-ntpd", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/jp/112/1128/1128965_cisco-sa-20150408-ntpd-j.html" }, { "title": "Red Hat: Moderate: ntp security, bug fix, and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20152231 - security advisory" }, { "title": "Ubuntu Security Notice: ntp vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-2567-1" }, { "title": "Debian CVElist Bug Report Logs: ntp: CVE-2015-1798 CVE-2015-1799", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=d133e5923f2516253cdb12d9d3c37c05" }, { "title": "Red Hat: CVE-2015-1799", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=cve-2015-1799" }, { "title": "Debian Security Advisories: DSA-3223-1 ntp -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=d552cdc6350071420c8916bcaed96264" }, { "title": "Amazon Linux AMI: ALAS-2015-520", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=alas-2015-520" }, { "title": "Cisco: Multiple Vulnerabilities in ntpd (April 2015) Affecting Cisco Products", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20150408-ntpd" }, { "title": "Apple: OS X Yosemite v10.10.4 and Security Update 2015-005", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=50398602701d671602946005c7864211" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - April 2015", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=2a43c5799a7dd07d6c0a92a3b040d12f" }, { "title": "Oracle Linux Bulletins: Oracle Linux Bulletin - October 2015", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins\u0026qid=435ed9abc2fb1e74ce2a69605a01e326" }, { "title": "The Register", "trust": 0.1, "url": "https://www.theregister.co.uk/2015/04/09/ntp_vulns/" }, { "title": "The Register", "trust": 0.1, "url": "https://www.theregister.co.uk/2015/04/09/cisco_security_software_needs_security_patch/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2015-1799" }, { "db": "JVNDB", "id": "JVNDB-2015-002116" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-17", "trust": 1.0 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-002116" }, { "db": "NVD", "id": "CVE-2015-1799" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "http://www.kb.cert.org/vuls/id/374268" }, { "trust": 2.0, "url": "http://support.ntp.org/bin/view/main/securitynotice#recent_vulnerabilities" }, { "trust": 1.9, "url": "http://bugs.ntp.org/show_bug.cgi?id=2781" }, { "trust": 1.5, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=38275" }, { "trust": 1.4, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20150408-ntpd" }, { "trust": 1.4, "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "trust": 1.2, "url": "http://www.ubuntu.com/usn/usn-2567-1" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032031" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2015:202" }, { "trust": 1.1, "url": "http://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-announce/2015/04/msg00002.html" }, { "trust": 1.1, "url": "http://www.debian.org/security/2015/dsa-3222" }, { "trust": 1.1, "url": "http://www.debian.org/security/2015/dsa-3223" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/73950" }, { "trust": 1.1, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-april/155863.html" }, { "trust": 1.1, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10114" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00052.html" }, { "trust": 1.1, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-april/155864.html" }, { "trust": 1.1, "url": "http://lists.apple.com/archives/security-announce/2015/jun/msg00002.html" }, { "trust": 1.1, "url": "http://support.apple.com/kb/ht204942" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=145750740530849\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=143213867103400\u0026w=2" }, { "trust": 1.1, "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "trust": 1.1, "url": "https://security.gentoo.org/glsa/201509-01" }, { "trust": 1.1, "url": "http://rhn.redhat.com/errata/rhsa-2015-1459.html" }, { "trust": 1.0, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1799" }, { "trust": 0.8, "url": "http://bugs.ntp.org/show_bug.cgi?id=2779" }, { "trust": 0.8, "url": "http://www.ntp.org/downloads.html" }, { "trust": 0.8, "url": "https://www.freebsd.org/security/advisories/freebsd-sa-15:07.ntp.asc" }, { "trust": 0.8, "url": "http://support.ntp.org/bin/view/main/securitynoticehttp://www.ntp.org/downloads.html" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu95993136/index.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-1799" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1799" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1798" }, { "trust": 0.4, "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-094-04" }, { "trust": 0.3, "url": "http://aix.software.ibm.com/aix/efixes/security/ntp_advisory3.asc" }, { "trust": 0.3, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=cve-2015-1799" }, { "trust": 0.3, "url": "http://www.ntp.org" }, { "trust": 0.3, "url": "http://seclists.org/bugtraq/2015/apr/156" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/hpsc/doc/public/display?docid=emr_na-c04679309" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022814" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1022831" }, { "trust": 0.3, "url": "http://aix.software.ibm.com/aix/efixes/security/ntp4_advisory.asc" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21966578" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21966675" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21967791" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21975967" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg2c1000111" }, { "trust": 0.3, "url": "https://gtacknowledge.extremenetworks.com/articles/vulnerability_notice/vn-2015-006-symmetric-key-ntp/?q=cve-2015-1798\u0026l=en_us\u0026fs=search\u0026pn=1" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2015-1799" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1798" }, { "trust": 0.2, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/17.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/2567-1/" }, { "trust": 0.1, "url": "http://slackware.com" }, { "trust": 0.1, "url": "http://osuosl.org)" }, { "trust": 0.1, "url": "http://slackware.com/gpg-key" }, { "trust": 0.1, "url": "http://support.ntp.org/bin/view/main/securitynotice" }, { "trust": 0.1, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 0.1, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.1, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.1, "url": "https://h20392.www2.hp.com/portal/swdepot/displayproductinfo.do?productnumber" }, { "trust": 0.1, "url": "https://www.hp.com/go/swa" }, { "trust": 0.1, "url": "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_n" }, { "trust": 0.1, "url": "http://www.hpe.com/support/subscriber_choice" }, { "trust": 0.1, "url": "http://www.hpe.com/support/security_bulletin_archive" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/" }, { "trust": 0.1, "url": "http://www.mandriva.com/en/support/security/advisories/" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/ntp/1:4.2.6.p5+dfsg-3ubuntu2.14.10.3" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/ntp/1:4.2.6.p3+dfsg-1ubuntu3.4" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/ntp/1:4.2.6.p5+dfsg-3ubuntu2.14.04.3" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-9297" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-3405" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-9750" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-9751" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-9297" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2015-2231.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-9298" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2014-9751" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-9750" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3405" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-1798" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-9298" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0288" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0287" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3673" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-8141" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-8140" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0235" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ht1222" }, { "trust": 0.1, "url": "https://support.apple.com/en-us/ht204938" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3672" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0209" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-8127" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0289" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3661" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3671" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-1741" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-8128" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-8130" }, { "trust": 0.1, "url": "https://support.apple.com/en-" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-8139" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3662" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-8129" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-1157" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://support.apple.com/en-us/ht204950" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3663" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3668" }, { "trust": 0.1, "url": "http://gpgtools.org" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0293" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0273" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3666" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-0286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3667" } ], "sources": [ { "db": "CERT/CC", "id": "VU#374268" }, { "db": "VULMON", "id": "CVE-2015-1799" }, { "db": "BID", "id": "73950" }, { "db": "JVNDB", "id": "JVNDB-2015-002116" }, { "db": "PACKETSTORM", "id": "131582" }, { "db": "PACKETSTORM", "id": "131941" }, { "db": "PACKETSTORM", "id": "136119" }, { "db": "PACKETSTORM", "id": "131385" }, { "db": "PACKETSTORM", "id": "131405" }, { "db": "PACKETSTORM", "id": "134448" }, { "db": "PACKETSTORM", "id": "131396" }, { "db": "PACKETSTORM", "id": "132518" }, { "db": "NVD", "id": "CVE-2015-1799" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#374268" }, { "db": "VULMON", "id": "CVE-2015-1799" }, { "db": "BID", "id": "73950" }, { "db": "JVNDB", "id": "JVNDB-2015-002116" }, { "db": "PACKETSTORM", "id": "131582" }, { "db": "PACKETSTORM", "id": "131941" }, { "db": "PACKETSTORM", "id": "136119" }, { "db": "PACKETSTORM", "id": "131385" }, { "db": "PACKETSTORM", "id": "131405" }, { "db": "PACKETSTORM", "id": "134448" }, { "db": "PACKETSTORM", "id": "131396" }, { "db": "PACKETSTORM", "id": "132518" }, { "db": "NVD", "id": "CVE-2015-1799" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-04-07T00:00:00", "db": "CERT/CC", "id": "VU#374268" }, { "date": "2015-04-08T00:00:00", "db": "VULMON", "id": "CVE-2015-1799" }, { "date": "2015-04-07T00:00:00", "db": "BID", "id": "73950" }, { "date": "2015-04-09T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-002116" }, { "date": "2015-04-22T20:14:29", "db": "PACKETSTORM", "id": "131582" }, { "date": "2015-05-20T23:06:21", "db": "PACKETSTORM", "id": "131941" }, { "date": "2016-03-08T10:18:00", "db": "PACKETSTORM", "id": "136119" }, { "date": "2015-04-13T14:03:24", "db": "PACKETSTORM", "id": "131385" }, { "date": "2015-04-14T18:53:39", "db": "PACKETSTORM", "id": "131405" }, { "date": "2015-11-20T00:42:01", "db": "PACKETSTORM", "id": "134448" }, { "date": "2015-04-13T14:05:55", "db": "PACKETSTORM", "id": "131396" }, { "date": "2015-07-01T05:31:53", "db": "PACKETSTORM", "id": "132518" }, { "date": "2015-04-08T10:59:05.717000", "db": "NVD", "id": "CVE-2015-1799" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-04-10T00:00:00", "db": "CERT/CC", "id": "VU#374268" }, { "date": "2018-01-05T00:00:00", "db": "VULMON", "id": "CVE-2015-1799" }, { "date": "2017-05-23T16:24:00", "db": "BID", "id": "73950" }, { "date": "2015-07-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-002116" }, { "date": "2018-01-05T02:30:00.447000", "db": "NVD", "id": "CVE-2015-1799" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "73950" } ], "trust": 0.3 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "NTP Project ntpd reference implementation contains multiple vulnerabilities", "sources": [ { "db": "CERT/CC", "id": "VU#374268" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown", "sources": [ { "db": "BID", "id": "73950" } ], "trust": 0.3 } }
gsd-2015-1799
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2015-1799", "description": "The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer.", "id": "GSD-2015-1799", "references": [ "https://www.suse.com/security/cve/CVE-2015-1799.html", "https://www.debian.org/security/2015/dsa-3223", "https://access.redhat.com/errata/RHSA-2015:2231", "https://access.redhat.com/errata/RHSA-2015:1459", "https://ubuntu.com/security/CVE-2015-1799", "https://advisories.mageia.org/CVE-2015-1799.html", "https://alas.aws.amazon.com/cve/html/CVE-2015-1799.html", "https://linux.oracle.com/cve/CVE-2015-1799.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-1799" ], "details": "The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer.", "id": "GSD-2015-1799", "modified": "2023-12-13T01:20:05.465175Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-1799", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "refsource": "MISC", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2015-1459.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2015-1459.html" }, { "name": "http://www.debian.org/security/2015/dsa-3223", "refsource": "MISC", "url": "http://www.debian.org/security/2015/dsa-3223" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "refsource": "MISC", "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "name": "http://support.apple.com/kb/HT204942", "refsource": "MISC", "url": "http://support.apple.com/kb/HT204942" }, { "name": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html", "refsource": "MISC", "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155863.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155863.html" }, { "name": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155864.html", "refsource": "MISC", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155864.html" }, { "name": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00052.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00052.html" }, { "name": "http://marc.info/?l=bugtraq\u0026m=143213867103400\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=bugtraq\u0026m=143213867103400\u0026w=2" }, { "name": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities", "refsource": "MISC", "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities" }, { "name": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-ntpd", "refsource": "MISC", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-ntpd" }, { "name": "http://www.kb.cert.org/vuls/id/374268", "refsource": "MISC", "url": "http://www.kb.cert.org/vuls/id/374268" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:202", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:202" }, { "name": "http://www.ubuntu.com/usn/USN-2567-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-2567-1" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10114", "refsource": "MISC", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10114" }, { "name": "https://security.gentoo.org/glsa/201509-01", "refsource": "MISC", "url": "https://security.gentoo.org/glsa/201509-01" }, { "name": "http://bugs.ntp.org/show_bug.cgi?id=2781", "refsource": "MISC", "url": "http://bugs.ntp.org/show_bug.cgi?id=2781" }, { "name": "http://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-announce/2015/04/msg00002.html", "refsource": "MISC", "url": "http://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-announce/2015/04/msg00002.html" }, { "name": "http://marc.info/?l=bugtraq\u0026m=145750740530849\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=bugtraq\u0026m=145750740530849\u0026w=2" }, { "name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38275", "refsource": "MISC", "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38275" }, { "name": "http://www.debian.org/security/2015/dsa-3222", "refsource": "MISC", "url": "http://www.debian.org/security/2015/dsa-3222" }, { "name": "http://www.securityfocus.com/bid/73950", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/73950" }, { "name": "http://www.securitytracker.com/id/1032031", "refsource": "MISC", "url": "http://www.securitytracker.com/id/1032031" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "4.2.7p444", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-1799" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-17" } ] } ] }, "references": { "reference_data": [ { "name": "http://bugs.ntp.org/show_bug.cgi?id=2781", "refsource": "CONFIRM", "tags": [], "url": "http://bugs.ntp.org/show_bug.cgi?id=2781" }, { "name": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities" }, { "name": "VU#374268", "refsource": "CERT-VN", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/374268" }, { "name": "20150408 Network Time Protocol Daemon Symmetric Mode Packet Processing Denial of Service Vulnerability", "refsource": "CISCO", "tags": [], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=38275" }, { "name": "1032031", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1032031" }, { "name": "20150408 Multiple Vulnerabilities in ntpd (April 2015) Affecting Cisco Products", "refsource": "CISCO", "tags": [], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150408-ntpd" }, { "name": "MDVSA-2015:202", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:202" }, { "name": "[chrony-announce] 20150407 chrony-1.31.1 released (security)", "refsource": "MLIST", "tags": [], "url": "http://listengine.tuxfamily.org/chrony.tuxfamily.org/chrony-announce/2015/04/msg00002.html" }, { "name": "DSA-3222", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2015/dsa-3222" }, { "name": "DSA-3223", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2015/dsa-3223" }, { "name": "USN-2567-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2567-1" }, { "name": "73950", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/73950" }, { "name": "FEDORA-2015-5874", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155863.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10114", "refsource": "CONFIRM", "tags": [], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10114" }, { "name": "openSUSE-SU-2015:0775", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-updates/2015-04/msg00052.html" }, { "name": "FEDORA-2015-5761", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155864.html" }, { "name": "APPLE-SA-2015-06-30-2", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html" }, { "name": "http://support.apple.com/kb/HT204942", "refsource": "CONFIRM", "tags": [], "url": "http://support.apple.com/kb/HT204942" }, { "name": "HPSBHF03557", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=145750740530849\u0026w=2" }, { "name": "SSRT102029", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=143213867103400\u0026w=2" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html" }, { "name": "GLSA-201509-01", "refsource": "GENTOO", "tags": [], "url": "https://security.gentoo.org/glsa/201509-01" }, { "name": "RHSA-2015:1459", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-1459.html" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2018-01-05T02:30Z", "publishedDate": "2015-04-08T10:59Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.