Back to bug 1331461
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Martin Prpič | 2016-04-28 14:50:58 UTC | Blocks | 1331437 | |
| Slawomir Czarko | 2016-04-29 07:16:13 UTC | CC | slawomir | |
| Martin Prpič | 2016-05-02 11:33:33 UTC | Whiteboard | impact=moderate,public=20160426,reported=20160426,source=internet,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,rhel-5/ntp=new,rhel-6/ntp=new,rhel-7/ntp=new,fedora-all/ntp=new | impact=moderate,public=20160426,reported=20160426,source=internet,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,rhel-5/ntp=affected,rhel-6/ntp=affected,rhel-7/ntp=affected,fedora-all/ntp=notaffected |
| Stefan Cornelius | 2016-05-03 13:46:41 UTC | Depends On | 1332478 | |
| Stefan Cornelius | 2016-05-03 13:46:56 UTC | Depends On | 1332479 | |
| Stefan Cornelius | 2016-05-03 13:47:13 UTC | Depends On | 1332480 | |
| Stefan Cornelius | 2016-05-03 13:47:28 UTC | Depends On | 1332481 | |
| Jay Shin | 2016-05-06 01:28:30 UTC | CC | jaeshin | |
| Link ID | Red Hat Knowledge Base (Solution) 2300641 | |||
| Norman Sardella | 2016-05-06 19:46:57 UTC | CC | sardella | |
| Martin Prpič | 2016-05-10 14:29:15 UTC | Summary | CVE-2016-1547 ntp: crypto-NAK preemptable sssociation denial of service | CVE-2016-1547 ntp: crypto-NAK preemptable association denial of service |
| Muhammad Azhar Shaikh | 2016-05-14 07:15:30 UTC | CC | mdshaikh | |
| Apurbita Mukherjee | 2016-05-25 05:19:17 UTC | CC | apmukher | |
| Martin Prpič | 2016-05-30 13:38:48 UTC | Whiteboard | impact=moderate,public=20160426,reported=20160426,source=internet,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,rhel-5/ntp=affected,rhel-6/ntp=affected,rhel-7/ntp=affected,fedora-all/ntp=notaffected | impact=moderate,public=20160426,reported=20160426,source=internet,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,rhel-5/ntp=wontfix,rhel-6/ntp=affected,rhel-7/ntp=affected,fedora-all/ntp=notaffected |
| Martin Prpič | 2016-05-30 13:55:54 UTC | Doc Text | A denial of service flaw was found in the way NTP handled preemptable client associations. A remote attacker could send several crypto NAK packets to a victim client, each with a spoofed source address of an existing associated peer, preventing that client from synchronizing its time. | |
| Tomas Hoger | 2016-05-31 08:23:15 UTC | Status | NEW | CLOSED |
| Resolution | --- | ERRATA | ||
| Last Closed | 2016-05-31 04:23:15 UTC | |||
| Martin Prpič | 2016-07-15 11:57:04 UTC | Whiteboard | impact=moderate,public=20160426,reported=20160426,source=internet,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,rhel-5/ntp=wontfix,rhel-6/ntp=affected,rhel-7/ntp=affected,fedora-all/ntp=notaffected | impact=moderate,public=20160426,reported=20160426,source=internet,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,rhel-5/ntp=wontfix,rhel-6/ntp=affected,rhel-7/ntp=affected,fedora-all/ntp=notaffected,rhel-6.7.z/ntp=affected |
| Martin Prpič | 2016-07-15 11:58:35 UTC | Depends On | 1356967 | |
| Product Security DevOps Team | 2019-09-29 13:48:22 UTC | Whiteboard | impact=moderate,public=20160426,reported=20160426,source=internet,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,rhel-5/ntp=wontfix,rhel-6/ntp=affected,rhel-7/ntp=affected,fedora-all/ntp=notaffected,rhel-6.7.z/ntp=affected |
Back to bug 1331461