Back to bug 1300273

Who When What Removed Added
Martin Prpič 2016-01-20 11:43:56 UTC Blocks 1297474
Martin Prpič 2016-01-20 12:01:23 UTC Depends On 1300277
Martin Prpič 2016-01-20 14:36:00 UTC Status NEW CLOSED
Resolution --- WONTFIX
Whiteboard impact=low,public=20160120,reported=20160120,source=git,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-835,fedora-all/ntp=affected,rhel-5/ntp=affected,rhel-6/ntp=affected,rhel-7/ntp=affected impact=low,public=20160120,reported=20160120,source=git,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-835,fedora-all/ntp=affected,rhel-5/ntp=wontfix,rhel-6/ntp=wontfix,rhel-7/ntp=wontfix
Last Closed 2016-01-20 09:36:00 UTC
Norman Sardella 2016-02-12 14:48:51 UTC CC sardella
Martin Prpič 2016-03-15 08:59:53 UTC Whiteboard impact=low,public=20160120,reported=20160120,source=git,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-835,fedora-all/ntp=affected,rhel-5/ntp=wontfix,rhel-6/ntp=wontfix,rhel-7/ntp=wontfix impact=low,public=20160120,reported=20160120,source=git,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-835,fedora-all/ntp=affected,rhel-5/ntp=wontfix,rhel-6/ntp=wontfix,rhel-7/ntp=affected
Martin Prpič 2016-03-15 09:01:31 UTC Depends On 1317795
Huzaifa S. Sidhpurwala 2016-08-23 06:39:26 UTC Blocks 1323912
Martin Prpič 2016-10-13 07:08:05 UTC Doc Text A flaw was found in the way the ntpq client processed certain incoming packets in a loop in the getresponse() function. A remote attacker could potentially use this flaw to crash an ntpq client instance.
Huzaifa S. Sidhpurwala 2016-11-06 04:15:08 UTC Resolution WONTFIX ERRATA
Product Security DevOps Team 2019-09-29 13:42:36 UTC Whiteboard impact=low,public=20160120,reported=20160120,source=git,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-835,fedora-all/ntp=affected,rhel-5/ntp=wontfix,rhel-6/ntp=wontfix,rhel-7/ntp=affected

Back to bug 1300273