Back to bug 1300273
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Martin Prpič | 2016-01-20 11:43:56 UTC | Blocks | 1297474 | |
| Martin Prpič | 2016-01-20 12:01:23 UTC | Depends On | 1300277 | |
| Martin Prpič | 2016-01-20 14:36:00 UTC | Status | NEW | CLOSED |
| Resolution | --- | WONTFIX | ||
| Whiteboard | impact=low,public=20160120,reported=20160120,source=git,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-835,fedora-all/ntp=affected,rhel-5/ntp=affected,rhel-6/ntp=affected,rhel-7/ntp=affected | impact=low,public=20160120,reported=20160120,source=git,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-835,fedora-all/ntp=affected,rhel-5/ntp=wontfix,rhel-6/ntp=wontfix,rhel-7/ntp=wontfix | ||
| Last Closed | 2016-01-20 09:36:00 UTC | |||
| Norman Sardella | 2016-02-12 14:48:51 UTC | CC | sardella | |
| Martin Prpič | 2016-03-15 08:59:53 UTC | Whiteboard | impact=low,public=20160120,reported=20160120,source=git,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-835,fedora-all/ntp=affected,rhel-5/ntp=wontfix,rhel-6/ntp=wontfix,rhel-7/ntp=wontfix | impact=low,public=20160120,reported=20160120,source=git,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-835,fedora-all/ntp=affected,rhel-5/ntp=wontfix,rhel-6/ntp=wontfix,rhel-7/ntp=affected |
| Martin Prpič | 2016-03-15 09:01:31 UTC | Depends On | 1317795 | |
| Huzaifa S. Sidhpurwala | 2016-08-23 06:39:26 UTC | Blocks | 1323912 | |
| Martin Prpič | 2016-10-13 07:08:05 UTC | Doc Text | A flaw was found in the way the ntpq client processed certain incoming packets in a loop in the getresponse() function. A remote attacker could potentially use this flaw to crash an ntpq client instance. | |
| Huzaifa S. Sidhpurwala | 2016-11-06 04:15:08 UTC | Resolution | WONTFIX | ERRATA |
| Product Security DevOps Team | 2019-09-29 13:42:36 UTC | Whiteboard | impact=low,public=20160120,reported=20160120,source=git,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-835,fedora-all/ntp=affected,rhel-5/ntp=wontfix,rhel-6/ntp=wontfix,rhel-7/ntp=affected |
Back to bug 1300273