Bugzilla – Full Text Bug Listing |
Summary: | VUL-0: CVE-2016-7429: ntp: Attack on interface selection | ||
---|---|---|---|
Product: | [Novell Products] SUSE Security Incidents | Reporter: | Matthias Gerstner <matthias.gerstner> |
Component: | Incidents | Assignee: | Security Team bot <security-team> |
Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
Severity: | Minor | ||
Priority: | P3 - Medium | CC: | matthias.gerstner |
Version: | unspecified | ||
Target Milestone: | --- | ||
Hardware: | Other | ||
OS: | Other | ||
Whiteboard: | CVSSv2:RedHat:CVE-2016-7429:2.6:(AV:N/AC:H/Au:N/C:N/I:N/A:P) CVSSv2:SUSE:CVE-2016-7429:1.0:(AV:L/AC:H/Au:S/C:N/I:N/A:P) maint:released:sle10-sp3:63240 CVSSv2:NVD:CVE-2016-7429:4.3:(AV:N/AC:M/Au:N/C:N/I:N/A:P) maint:released:oes11-sp2:63262 CVSSv3:NVD:CVE-2016-7429:3.7:(AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) CVSSv3:RedHat:CVE-2016-7429:3.7:(AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) | ||
Found By: | --- | Services Priority: | |
Business Priority: | Blocker: | --- | |
Marketing QA Status: | --- | IT Deployment: | --- |
Bug Depends on: | |||
Bug Blocks: | 1011421 |
Description
Matthias Gerstner
2016-11-21 16:54:44 UTC
bugbot adjusting priority An update workflow for this issue was started. This issue was rated as moderate. Please submit fixed packages until 2016-12-08. When done, reassign the bug to security-team@suse.de. https://swamp.suse.de/webswamp/wf/63222 Packages submitted. SUSE-SU-2016:3193-1: An update that solves 12 vulnerabilities and has three fixes is now available. Category: security (moderate) Bug References: 1009434,1011377,1011390,1011395,1011398,1011404,1011406,1011411,1011417,943216,956365,981252,988028,992038,992606 CVE References: CVE-2015-5219,CVE-2015-8139,CVE-2015-8140,CVE-2016-7426,CVE-2016-7427,CVE-2016-7428,CVE-2016-7429,CVE-2016-7431,CVE-2016-7433,CVE-2016-7434,CVE-2016-9310,CVE-2016-9311 Sources used: SUSE Linux Enterprise Server 11-SP4 (src): ntp-4.2.8p9-57.2 SUSE Linux Enterprise Debuginfo 11-SP4 (src): ntp-4.2.8p9-57.2 SUSE-SU-2016:3195-1: An update that solves 10 vulnerabilities and has 5 fixes is now available. Category: security (moderate) Bug References: 1009434,1011377,1011390,1011395,1011398,1011404,1011406,1011411,1011417,943216,956365,981252,988028,992038,992606 CVE References: CVE-2015-5219,CVE-2016-7426,CVE-2016-7427,CVE-2016-7428,CVE-2016-7429,CVE-2016-7431,CVE-2016-7433,CVE-2016-7434,CVE-2016-9310,CVE-2016-9311 Sources used: SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src): ntp-4.2.8p9-55.1 SUSE Linux Enterprise Server 12-SP2 (src): ntp-4.2.8p9-55.1 SUSE Linux Enterprise Server 12-SP1 (src): ntp-4.2.8p9-55.1 SUSE Linux Enterprise Desktop 12-SP2 (src): ntp-4.2.8p9-55.1 SUSE Linux Enterprise Desktop 12-SP1 (src): ntp-4.2.8p9-55.1 SUSE-SU-2016:3196-1: An update that solves 10 vulnerabilities and has 5 fixes is now available. Category: security (moderate) Bug References: 1009434,1011377,1011390,1011395,1011398,1011404,1011406,1011411,1011417,943216,956365,981252,988028,992038,992606 CVE References: CVE-2015-5219,CVE-2016-7426,CVE-2016-7427,CVE-2016-7428,CVE-2016-7429,CVE-2016-7431,CVE-2016-7433,CVE-2016-7434,CVE-2016-9310,CVE-2016-9311 Sources used: SUSE Linux Enterprise Server for SAP 12 (src): ntp-4.2.8p9-46.18.1 SUSE Linux Enterprise Server 12-LTSS (src): ntp-4.2.8p9-46.18.1 openSUSE-SU-2016:3280-1: An update that solves 10 vulnerabilities and has 5 fixes is now available. Category: security (moderate) Bug References: 1009434,1011377,1011390,1011395,1011398,1011404,1011406,1011411,1011417,943216,956365,981252,988028,992038,992606 CVE References: CVE-2015-5219,CVE-2016-7426,CVE-2016-7427,CVE-2016-7428,CVE-2016-7429,CVE-2016-7431,CVE-2016-7433,CVE-2016-7434,CVE-2016-9310,CVE-2016-9311 Sources used: openSUSE Leap 42.2 (src): ntp-4.2.8p9-27.1 openSUSE Leap 42.1 (src): ntp-4.2.8p9-27.1 SUSE-SU-2017:0255-1: An update that solves 12 vulnerabilities and has three fixes is now available. Category: security (moderate) Bug References: 1009434,1011377,1011390,1011395,1011398,1011404,1011406,1011411,1011417,943216,956365,981252,988028,992038,992606 CVE References: CVE-2015-5219,CVE-2015-8139,CVE-2015-8140,CVE-2016-7426,CVE-2016-7427,CVE-2016-7428,CVE-2016-7429,CVE-2016-7431,CVE-2016-7433,CVE-2016-7434,CVE-2016-9310,CVE-2016-9311 Sources used: SUSE OpenStack Cloud 5 (src): ntp-4.2.8p9-48.9.1 SUSE Manager Proxy 2.1 (src): ntp-4.2.8p9-48.9.1 SUSE Manager 2.1 (src): ntp-4.2.8p9-48.9.1 SUSE Linux Enterprise Server 11-SP3-LTSS (src): ntp-4.2.8p9-48.9.1 SUSE Linux Enterprise Server 11-SP2-LTSS (src): ntp-4.2.8p9-48.9.1 SUSE Linux Enterprise Point of Sale 11-SP3 (src): ntp-4.2.8p9-48.9.1 SUSE Linux Enterprise Debuginfo 11-SP3 (src): ntp-4.2.8p9-48.9.1 SUSE Linux Enterprise Debuginfo 11-SP2 (src): ntp-4.2.8p9-48.9.1 released |