suse-su-2016:1471-1
Vulnerability from csaf_suse
Published
2016-06-01 12:36
Modified
2016-06-01 12:36
Summary
Security update for ntp

Notes

Title of the patch
Security update for ntp
Description of the patch
This update for ntp fixes the following issues: - Separate the creation of ntp.keys and key #1 in it to avoid problems when upgrading installations that have the file, but no key #1, which is needed e.g. by 'rcntp addserver'. - Update to 4.2.8p7 (bsc#977446): * CVE-2016-1547, bsc#977459: Validate crypto-NAKs, AKA: CRYPTO-NAK DoS. * CVE-2016-1548, bsc#977461: Interleave-pivot * CVE-2016-1549, bsc#977451: Sybil vulnerability: ephemeral association attack. * CVE-2016-1550, bsc#977464: Improve NTP security against buffer comparison timing attacks. * CVE-2016-1551, bsc#977450: Refclock impersonation vulnerability * CVE-2016-2516, bsc#977452: Duplicate IPs on unconfig directives will cause an assertion botch in ntpd. * CVE-2016-2517, bsc#977455: remote configuration trustedkey/ requestkey/controlkey values are not properly validated. * CVE-2016-2518, bsc#977457: Crafted addpeer with hmode > 7 causes array wraparound with MATCH_ASSOC. * CVE-2016-2519, bsc#977458: ctl_getitem() return value not always checked. * integrate ntp-fork.patch * Improve the fixes for: CVE-2015-7704, CVE-2015-7705, CVE-2015-7974 - Restrict the parser in the startup script to the first occurrance of 'keys' and 'controlkey' in ntp.conf (bsc#957226).
Patchnames
sleclo50sp3-ntp-12592,sleman21-ntp-12592,slemap21-ntp-12592,slessp2-ntp-12592,slessp3-ntp-12592
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for ntp",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThis update for ntp fixes the following issues: \n\n- Separate the creation of ntp.keys and key #1 in it to avoid\n  problems when upgrading installations that have the file, but\n  no key #1, which is needed e.g. by \u0027rcntp addserver\u0027.\n\n- Update to 4.2.8p7 (bsc#977446):\n  * CVE-2016-1547, bsc#977459:\n    Validate crypto-NAKs, AKA: CRYPTO-NAK DoS.\n  * CVE-2016-1548, bsc#977461: Interleave-pivot\n  * CVE-2016-1549, bsc#977451:\n    Sybil vulnerability: ephemeral association attack.\n  * CVE-2016-1550, bsc#977464: Improve NTP security against buffer\n    comparison timing attacks.\n  * CVE-2016-1551, bsc#977450:\n    Refclock impersonation vulnerability\n  * CVE-2016-2516, bsc#977452: Duplicate IPs on unconfig\n    directives will cause an assertion botch in ntpd.\n  * CVE-2016-2517, bsc#977455: remote configuration trustedkey/\n    requestkey/controlkey values are not properly validated.\n  * CVE-2016-2518, bsc#977457: Crafted addpeer with hmode \u003e 7\n    causes array wraparound with MATCH_ASSOC.\n  * CVE-2016-2519, bsc#977458: ctl_getitem() return value not\n    always checked.\n  * integrate ntp-fork.patch\n  * Improve the fixes for:\n    CVE-2015-7704, CVE-2015-7705, CVE-2015-7974\n- Restrict the parser in the startup script to the first\n  occurrance of \u0027keys\u0027 and \u0027controlkey\u0027 in ntp.conf (bsc#957226).\n\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "sleclo50sp3-ntp-12592,sleman21-ntp-12592,slemap21-ntp-12592,slessp2-ntp-12592,slessp3-ntp-12592",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1471-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2016:1471-1",
        "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161471-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2016:1471-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-June/002089.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 957226",
        "url": "https://bugzilla.suse.com/957226"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 977446",
        "url": "https://bugzilla.suse.com/977446"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 977450",
        "url": "https://bugzilla.suse.com/977450"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 977451",
        "url": "https://bugzilla.suse.com/977451"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 977452",
        "url": "https://bugzilla.suse.com/977452"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 977455",
        "url": "https://bugzilla.suse.com/977455"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 977457",
        "url": "https://bugzilla.suse.com/977457"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 977458",
        "url": "https://bugzilla.suse.com/977458"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 977459",
        "url": "https://bugzilla.suse.com/977459"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 977461",
        "url": "https://bugzilla.suse.com/977461"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 977464",
        "url": "https://bugzilla.suse.com/977464"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-7704 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-7704/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-7705 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-7705/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2015-7974 page",
        "url": "https://www.suse.com/security/cve/CVE-2015-7974/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-1547 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-1547/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-1548 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-1548/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-1549 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-1549/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-1550 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-1550/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-1551 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-1551/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-2516 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-2516/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-2517 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-2517/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-2518 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-2518/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-2519 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-2519/"
      }
    ],
    "title": "Security update for ntp",
    "tracking": {
      "current_release_date": "2016-06-01T12:36:52Z",
      "generator": {
        "date": "2016-06-01T12:36:52Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2016:1471-1",
      "initial_release_date": "2016-06-01T12:36:52Z",
      "revision_history": [
        {
          "date": "2016-06-01T12:36:52Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ntp-4.2.8p7-44.1.i586",
                "product": {
                  "name": "ntp-4.2.8p7-44.1.i586",
                  "product_id": "ntp-4.2.8p7-44.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "ntp-doc-4.2.8p7-44.1.i586",
                "product": {
                  "name": "ntp-doc-4.2.8p7-44.1.i586",
                  "product_id": "ntp-doc-4.2.8p7-44.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ntp-4.2.8p7-44.1.s390x",
                "product": {
                  "name": "ntp-4.2.8p7-44.1.s390x",
                  "product_id": "ntp-4.2.8p7-44.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ntp-doc-4.2.8p7-44.1.s390x",
                "product": {
                  "name": "ntp-doc-4.2.8p7-44.1.s390x",
                  "product_id": "ntp-doc-4.2.8p7-44.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "ntp-4.2.8p7-44.1.x86_64",
                "product": {
                  "name": "ntp-4.2.8p7-44.1.x86_64",
                  "product_id": "ntp-4.2.8p7-44.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ntp-doc-4.2.8p7-44.1.x86_64",
                "product": {
                  "name": "ntp-doc-4.2.8p7-44.1.x86_64",
                  "product_id": "ntp-doc-4.2.8p7-44.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE OpenStack Cloud 5",
                "product": {
                  "name": "SUSE OpenStack Cloud 5",
                  "product_id": "SUSE OpenStack Cloud 5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:cloud:5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Manager 2.1",
                "product": {
                  "name": "SUSE Manager 2.1",
                  "product_id": "SUSE Manager 2.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-manager-server:2.1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Manager Proxy 2.1",
                "product": {
                  "name": "SUSE Manager Proxy 2.1",
                  "product_id": "SUSE Manager Proxy 2.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-manager-proxy:2.1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 11 SP2-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 11 SP2-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 11 SP3-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
                "product": {
                  "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
                  "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles:11:sp3:teradata"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ntp-4.2.8p7-44.1.x86_64 as component of SUSE OpenStack Cloud 5",
          "product_id": "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64"
        },
        "product_reference": "ntp-4.2.8p7-44.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ntp-doc-4.2.8p7-44.1.x86_64 as component of SUSE OpenStack Cloud 5",
          "product_id": "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
        },
        "product_reference": "ntp-doc-4.2.8p7-44.1.x86_64",
        "relates_to_product_reference": "SUSE OpenStack Cloud 5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ntp-4.2.8p7-44.1.s390x as component of SUSE Manager 2.1",
          "product_id": "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x"
        },
        "product_reference": "ntp-4.2.8p7-44.1.s390x",
        "relates_to_product_reference": "SUSE Manager 2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ntp-4.2.8p7-44.1.x86_64 as component of SUSE Manager 2.1",
          "product_id": "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64"
        },
        "product_reference": "ntp-4.2.8p7-44.1.x86_64",
        "relates_to_product_reference": "SUSE Manager 2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ntp-doc-4.2.8p7-44.1.s390x as component of SUSE Manager 2.1",
          "product_id": "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x"
        },
        "product_reference": "ntp-doc-4.2.8p7-44.1.s390x",
        "relates_to_product_reference": "SUSE Manager 2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ntp-doc-4.2.8p7-44.1.x86_64 as component of SUSE Manager 2.1",
          "product_id": "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64"
        },
        "product_reference": "ntp-doc-4.2.8p7-44.1.x86_64",
        "relates_to_product_reference": "SUSE Manager 2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ntp-4.2.8p7-44.1.x86_64 as component of SUSE Manager Proxy 2.1",
          "product_id": "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64"
        },
        "product_reference": "ntp-4.2.8p7-44.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ntp-doc-4.2.8p7-44.1.x86_64 as component of SUSE Manager Proxy 2.1",
          "product_id": "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64"
        },
        "product_reference": "ntp-doc-4.2.8p7-44.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 2.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ntp-4.2.8p7-44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586"
        },
        "product_reference": "ntp-4.2.8p7-44.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ntp-4.2.8p7-44.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x"
        },
        "product_reference": "ntp-4.2.8p7-44.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ntp-4.2.8p7-44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64"
        },
        "product_reference": "ntp-4.2.8p7-44.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ntp-doc-4.2.8p7-44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586"
        },
        "product_reference": "ntp-doc-4.2.8p7-44.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ntp-doc-4.2.8p7-44.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x"
        },
        "product_reference": "ntp-doc-4.2.8p7-44.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ntp-doc-4.2.8p7-44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64"
        },
        "product_reference": "ntp-doc-4.2.8p7-44.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ntp-4.2.8p7-44.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586"
        },
        "product_reference": "ntp-4.2.8p7-44.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ntp-4.2.8p7-44.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x"
        },
        "product_reference": "ntp-4.2.8p7-44.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ntp-4.2.8p7-44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64"
        },
        "product_reference": "ntp-4.2.8p7-44.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ntp-doc-4.2.8p7-44.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586"
        },
        "product_reference": "ntp-doc-4.2.8p7-44.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ntp-doc-4.2.8p7-44.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x"
        },
        "product_reference": "ntp-doc-4.2.8p7-44.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ntp-doc-4.2.8p7-44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64"
        },
        "product_reference": "ntp-doc-4.2.8p7-44.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ntp-4.2.8p7-44.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
          "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586"
        },
        "product_reference": "ntp-4.2.8p7-44.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ntp-4.2.8p7-44.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
          "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x"
        },
        "product_reference": "ntp-4.2.8p7-44.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ntp-4.2.8p7-44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
          "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64"
        },
        "product_reference": "ntp-4.2.8p7-44.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ntp-doc-4.2.8p7-44.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
          "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586"
        },
        "product_reference": "ntp-doc-4.2.8p7-44.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ntp-doc-4.2.8p7-44.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
          "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x"
        },
        "product_reference": "ntp-doc-4.2.8p7-44.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ntp-doc-4.2.8p7-44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA",
          "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64"
        },
        "product_reference": "ntp-doc-4.2.8p7-44.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2015-7704",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-7704"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted \"KOD\" messages.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
          "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
          "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-7704",
          "url": "https://www.suse.com/security/cve/CVE-2015-7704"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1010964 for CVE-2015-7704",
          "url": "https://bugzilla.suse.com/1010964"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 951608 for CVE-2015-7704",
          "url": "https://bugzilla.suse.com/951608"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 952611 for CVE-2015-7704",
          "url": "https://bugzilla.suse.com/952611"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 959243 for CVE-2015-7704",
          "url": "https://bugzilla.suse.com/959243"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 977446 for CVE-2015-7704",
          "url": "https://bugzilla.suse.com/977446"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-06-01T12:36:52Z",
          "details": "important"
        }
      ],
      "title": "CVE-2015-7704"
    },
    {
      "cve": "CVE-2015-7705",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-7705"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
          "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
          "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-7705",
          "url": "https://www.suse.com/security/cve/CVE-2015-7705"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1010964 for CVE-2015-7705",
          "url": "https://bugzilla.suse.com/1010964"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 951608 for CVE-2015-7705",
          "url": "https://bugzilla.suse.com/951608"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 952611 for CVE-2015-7705",
          "url": "https://bugzilla.suse.com/952611"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 959243 for CVE-2015-7705",
          "url": "https://bugzilla.suse.com/959243"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-06-01T12:36:52Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2015-7705"
    },
    {
      "cve": "CVE-2015-7974",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2015-7974"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a \"skeleton key.\"",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
          "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
          "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2015-7974",
          "url": "https://www.suse.com/security/cve/CVE-2015-7974"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 959243 for CVE-2015-7974",
          "url": "https://bugzilla.suse.com/959243"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 962960 for CVE-2015-7974",
          "url": "https://bugzilla.suse.com/962960"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 962995 for CVE-2015-7974",
          "url": "https://bugzilla.suse.com/962995"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-06-01T12:36:52Z",
          "details": "low"
        }
      ],
      "title": "CVE-2015-7974"
    },
    {
      "cve": "CVE-2016-1547",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-1547"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
          "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
          "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-1547",
          "url": "https://www.suse.com/security/cve/CVE-2016-1547"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 962784 for CVE-2016-1547",
          "url": "https://bugzilla.suse.com/962784"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 977446 for CVE-2016-1547",
          "url": "https://bugzilla.suse.com/977446"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 977459 for CVE-2016-1547",
          "url": "https://bugzilla.suse.com/977459"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 982064 for CVE-2016-1547",
          "url": "https://bugzilla.suse.com/982064"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 982065 for CVE-2016-1547",
          "url": "https://bugzilla.suse.com/982065"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-06-01T12:36:52Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2016-1547"
    },
    {
      "cve": "CVE-2016-1548",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-1548"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-\u003edst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
          "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
          "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-1548",
          "url": "https://www.suse.com/security/cve/CVE-2016-1548"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 959243 for CVE-2016-1548",
          "url": "https://bugzilla.suse.com/959243"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 977446 for CVE-2016-1548",
          "url": "https://bugzilla.suse.com/977446"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 977461 for CVE-2016-1548",
          "url": "https://bugzilla.suse.com/977461"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 982068 for CVE-2016-1548",
          "url": "https://bugzilla.suse.com/982068"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-06-01T12:36:52Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2016-1548"
    },
    {
      "cve": "CVE-2016-1549",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-1549"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A malicious authenticated peer can create arbitrarily-many ephemeral associations in order to win the clock selection algorithm in ntpd in NTP 4.2.8p4 and earlier and NTPsec 3e160db8dc248a0bcb053b56a80167dc742d2b74 and a5fb34b9cc89b92a8fef2f459004865c93bb7f92 and modify a victim\u0027s clock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
          "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
          "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-1549",
          "url": "https://www.suse.com/security/cve/CVE-2016-1549"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1083424 for CVE-2016-1549",
          "url": "https://bugzilla.suse.com/1083424"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 977446 for CVE-2016-1549",
          "url": "https://bugzilla.suse.com/977446"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 977451 for CVE-2016-1549",
          "url": "https://bugzilla.suse.com/977451"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-06-01T12:36:52Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-1549"
    },
    {
      "cve": "CVE-2016-1550",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-1550"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest key.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
          "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
          "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-1550",
          "url": "https://www.suse.com/security/cve/CVE-2016-1550"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 977446 for CVE-2016-1550",
          "url": "https://bugzilla.suse.com/977446"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 977464 for CVE-2016-1550",
          "url": "https://bugzilla.suse.com/977464"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-06-01T12:36:52Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-1550"
    },
    {
      "cve": "CVE-2016-1551",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-1551"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "ntpd in NTP 4.2.8p3 and NTPsec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 relies on the underlying operating system to protect it from requests that impersonate reference clocks. Because reference clocks are treated like other peers and stored in the same structure, any packet with a source ip address of a reference clock (127.127.1.1 for example) that reaches the receive() function will match that reference clock\u0027s peer record and will be treated as a trusted peer. Any system that lacks the typical martian packet filtering which would block these packets is in danger of having its time controlled by an attacker.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
          "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
          "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-1551",
          "url": "https://www.suse.com/security/cve/CVE-2016-1551"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 977446 for CVE-2016-1551",
          "url": "https://bugzilla.suse.com/977446"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 977450 for CVE-2016-1551",
          "url": "https://bugzilla.suse.com/977450"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-06-01T12:36:52Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-1551"
    },
    {
      "cve": "CVE-2016-2516",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-2516"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "NTP before 4.2.8p7 and 4.3.x before 4.3.92, when mode7 is enabled, allows remote attackers to cause a denial of service (ntpd abort) by using the same IP address multiple times in an unconfig directive.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
          "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
          "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-2516",
          "url": "https://www.suse.com/security/cve/CVE-2016-2516"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 977446 for CVE-2016-2516",
          "url": "https://bugzilla.suse.com/977446"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 977452 for CVE-2016-2516",
          "url": "https://bugzilla.suse.com/977452"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-06-01T12:36:52Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2016-2516"
    },
    {
      "cve": "CVE-2016-2517",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-2517"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (prevent subsequent authentication) by leveraging knowledge of the controlkey or requestkey and sending a crafted packet to ntpd, which changes the value of trustedkey, controlkey, or requestkey.  NOTE: this vulnerability exists because of a CVE-2016-2516 regression.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
          "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
          "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-2517",
          "url": "https://www.suse.com/security/cve/CVE-2016-2517"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 977446 for CVE-2016-2517",
          "url": "https://bugzilla.suse.com/977446"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 977455 for CVE-2016-2517",
          "url": "https://bugzilla.suse.com/977455"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-06-01T12:36:52Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2016-2517"
    },
    {
      "cve": "CVE-2016-2518",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-2518"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
          "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
          "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-2518",
          "url": "https://www.suse.com/security/cve/CVE-2016-2518"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 977446 for CVE-2016-2518",
          "url": "https://bugzilla.suse.com/977446"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 977457 for CVE-2016-2518",
          "url": "https://bugzilla.suse.com/977457"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-06-01T12:36:52Z",
          "details": "low"
        }
      ],
      "title": "CVE-2016-2518"
    },
    {
      "cve": "CVE-2016-2519",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-2519"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "ntpd in NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (ntpd abort) by a large request data value, which triggers the ctl_getitem function to return a NULL value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
          "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
          "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
          "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
          "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
          "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-2519",
          "url": "https://www.suse.com/security/cve/CVE-2016-2519"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 959243 for CVE-2016-2519",
          "url": "https://bugzilla.suse.com/959243"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 977446 for CVE-2016-2519",
          "url": "https://bugzilla.suse.com/977446"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 977458 for CVE-2016-2519",
          "url": "https://bugzilla.suse.com/977458"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP2-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-LTSS:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.i586",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Linux Enterprise Server 11 SP3-TERADATA:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.s390x",
            "SUSE Manager 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-4.2.8p7-44.1.x86_64",
            "SUSE Manager Proxy 2.1:ntp-doc-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-4.2.8p7-44.1.x86_64",
            "SUSE OpenStack Cloud 5:ntp-doc-4.2.8p7-44.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2016-06-01T12:36:52Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2016-2519"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…